US20140310800A1 - Secure disk access control - Google Patents
Secure disk access control Download PDFInfo
- Publication number
- US20140310800A1 US20140310800A1 US14/126,880 US201314126880A US2014310800A1 US 20140310800 A1 US20140310800 A1 US 20140310800A1 US 201314126880 A US201314126880 A US 201314126880A US 2014310800 A1 US2014310800 A1 US 2014310800A1
- Authority
- US
- United States
- Prior art keywords
- data
- write
- storage
- secure
- secure storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Definitions
- This disclosure relates in general to the field of computer security and, more particularly, to malware detection and remediation.
- Storage is precious resource on computing systems.
- Storage devices of computing systems can be repositories not only for application files and data but also critical operating system files, and critical high-value data, including sensitive personal data, among other examples.
- Root kits, viruses, and other malware attacks have been known to target storage devices such as the boot loader (e.g., a master boot record (MBR)), file systems, disk regions, etc. of a storage device.
- Examples of such malicious programs include TDL4, Trojan.Mebroot, Popureb.E, Max++, among others.
- Such malicious programs can manipulate system storage to create room for their persistence, create private file systems or storage partitions, commit data theft, data leak, and data loss, among other examples.
- FIG. 1 is a simplified schematic diagram of an example system including an example disk access security agent
- FIG. 2 is a simplified block diagram of an example system including an example storage device
- FIG. 3 is a simplified block diagram representing aspects of an example system including an example disk access security agent and common API;
- FIG. 4 is a simplified block diagram representing interactions between an example disk access security agent and example secure-storage-enabled storage devices
- FIGS. 5A-5B are simplified block diagrams representing example secure storage operations
- FIGS. 6A-6C are simplified block diagrams representing example secure storage operations
- FIGS. 7A-7C are simplified block diagrams representing example secure storage operations
- FIGS. 8A-8B are simplified representations of data records in an example secure-storage-enabled storage device
- FIGS. 9A-9E are flowcharts representing example techniques involving an example disk access security agent
- FIG. 10 is a block is a block diagram of an exemplary processor in accordance with one embodiment
- FIG. 11 is a block diagram of an exemplary mobile device system in accordance with one embodiment.
- FIG. 12 is a block diagram of an exemplary computing system in accordance with one embodiment.
- FIG. 1 illustrates an example system 100 including, for instance, an example computing device 105 having a disk access security agent 115 capable of interfacing with and controlling one or more storage devices (e.g., 110 ) utilized by the computing device 105 .
- a disk access security agent 115 can control operations and logic available at the storage device level (e.g., 11 )) to provide specialized secure storage functionality extending to the lowest layer of a system software stack.
- the disk access security agent 115 can interface with functionality provided on the secure-storage-enabled storage devices (e.g., 110 ) through one or more APIs (e.g., 120 ).
- a disk access security agent 115 can be configured to potentially interface with multiple secure-storage-enabled storage devices through a single, common API 120 , among other potential examples.
- disk access security agent 115 can further interface with and connect to security management tools (e.g., 125 ), including suites of security tools, providing high-level security assessment and policy management services.
- security management tools e.g., 125
- Such security tools can include, for instance, host intrusion prevention systems, anti-malware detection and remediation tools, data access controls and protection, among other examples.
- security policies e.g., 130
- outside e.g., remote and/or third-party
- security management tools as well as security tools present on the computing device 105
- a disk access security agent 115 can include one or more processors 132 and one or more memory elements 134 as well as one or more components providing various functionality, for instance, in connection with the disk access security agent's interaction with storage devices (e.g., 110 ).
- such components can include an attribution engine 136 , access decision engine 138 , policy manager 140 , intelligence engine 142 , self-protection engine 144 , early or off-line detection engines 146 , among potentially many other examples.
- an attribution engine 136 can possess functionality and logic for identifying, from information detected through monitored read/write attempts at a storage device 110 , the source of a particular read/write attempt, among other examples.
- a disk access security agent 115 can further include an access decision engine 138 possessing logic and functionality for determining actions to be taken, for instance, at the storage device 110 , in response to various read/write attempts at the storage device (e.g., based on identification of the source of a particular read/write attempt using attribution engine 136 ). Again, information can be collected at the storage device 110 or higher up the software stack describing monitored read/write attempts, this information can be provided to the disk access security agent 115 and utilized, for instance, by an example access decision engine 138 to determine whether the read/write attempt is a legitimate, desired, or trustworthy one, or, in some instances, an unknown or untrustworthy read/write attempt that should be blocked, further analyzed, or otherwise remediated.
- a disk access security agent 115 can, in some examples, further include additional components such as a policy manager 140 .
- An example policy manager 140 can include functionality for receiving, updating, and applying policies, such as policies 130 served to the disk access security agent 115 via one or more security management tools 125 , to read/write attempts of the disk (e.g., storage device 110 ) with which the disk access security agent 115 interfaces (e.g., through a common API 120 ).
- an intelligence engine 142 can be provided in some implementations of the disk access security agent 115 to gather intelligence from one or more security tools 125 discovering information relating to attributes of the computing device 105 , installed applications, hardware configurations, network configurations, known threats and vulnerabilities, among other examples.
- Intelligence collected through an example intelligence engine and/or through an example policy manager can be used to inform decisions, instructions, and controls of the disk access security agent 115 (e.g., using access decision engine 138 ) relating to activities of the storage device 110 (or “disk”).
- Additional components can include, for example, a self-protection module 144 , for use in utilizing functions of a storage device 110 to protect files and data utilized by the disk access security agent and/or other security related tools and applications used by the computing device, among other examples.
- a storage device 110 can be configured with logic for performing basic storage management and data read/write operations. Further, secure-storage-enabled storage devices (e.g., 110 ) can be further configured with functionality to perform functions, in some cases, in conjunction with a disk access security agent 115 , to realize various secure storage tasks.
- a storage device 110 can include (or be utilized with) one or more processor devices 148 , one or more memory elements 150 , as well as one or more components providing functionality for performing various secure storage functionality.
- Storage device 110 can be a repository for various data 170 and backup data 175 . In some examples, storage device 110 can store sensitive data including operating system files, local security tool files, the master boot record (MBR), volume boot record (VBR), among other examples.
- a secure-storage-enabled storage device can include logic that can enable robust, storage-device operations and checks, such as, for example, logic 152 enabling direct or trusted read capabilities allowing the storage device to bypass the disk stack file system and read directly from the data records on the storage device.
- an example storage device can possess logic 156 for performing direct trusted writes on its data.
- a storage device can possess logic 154 for performing basic data access control operations, such as blocking or disallowing, as well as modifying read, write, and other access attempts of the storage device data, such as particular regions of the storage device.
- a storage device can possess functionality for defining and initializing portions of the disk for secure storage (e.g., secure storage logic 158 ), and can further possess functionality for managing the disk (e.g., disk management logic 164 ).
- an example storage device can possess logic for defining and reserving sections of memory as an encrypted secure vault 180 section.
- storage device can be configured with logic 160 for performing a copy on write operation to automatically produce a backup copy of one or more data records in response to an attempt to overwrite the one or more data records.
- An example storage device can be further configured with logic 162 to produce other backup copies, for instance, copying a particular write attempt and saving the write attempt to backup memory, in lieu of allowing the write attempt to overwrite the actual targeted data records (e.g., a save attempted write (SAW) operation).
- storage device can be provided with logic 166 for locking particular records, for instance, through an LBA lock, etc. Additional features and functionality of a secure-storage-enabled storage device (e.g., 110 ) can include logic for performing false data reads, logic for blocking certain write or read attempts, logic for returning a false write success, among other examples.
- servers can include electronic computing devices operable to receive, transmit, process, store, or manage data and information associated with the computing environment 100 .
- computer can include any suitable processing device.
- elements shown as single devices within the computing environment 100 may be implemented using a plurality of computing devices and processors, such as server pools including multiple server computers.
- any, all, or some of the computing devices may be adapted to execute any operating system, including Linux, UNIX, Microsoft Windows, Apple OS, Apple iOS, Google Android, Windows Server, etc., as well as virtual machines adapted to virtualize execution of a particular operating system, including customized and proprietary operating systems.
- any operating system including Linux, UNIX, Microsoft Windows, Apple OS, Apple iOS, Google Android, Windows Server, etc.
- virtual machines adapted to virtualize execution of a particular operating system, including customized and proprietary operating systems.
- servers, client devices, network elements, systems, and computing devices can each include one or more processors, computer-readable memory, and one or more interfaces, among other features and hardware.
- Servers can include any suitable software component or module, or computing device(s) capable of hosting and/or serving software applications and services, including distributed, enterprise, or cloud-based software applications, data, and services.
- security management tools can be implemented on cloud-implemented computing systems configured to remotely host, serve, or otherwise manage data, software services and applications interfacing, coordinating with, dependent on, or used by other services and devices in system 100 .
- a server, system, subsystem, or computing device can be implemented as some combination of devices that can be hosted on a common computing system, server, server pool, or cloud computing environment and share computing resources, including shared memory, processors, and interfaces.
- Computing devices can include traditional and mobile computing devices, including personal computers, laptop computers, tablet computers, smartphones, personal digital assistants, feature phones, handheld video game consoles, desktop computers, internet-enabled televisions, and other devices designed to interface with human users and capable of communicating with other devices over one or more networks.
- Computer-assisted, or “smart,” appliances can include household and industrial devices and machines that include computer processors and are controlled, monitored, assisted, supplemented, or otherwise enhance the functionality of the devices by the computer processor, other hardware, and/or one or more software programs executed by the computer processor.
- Computer-assisted appliances can include a wide-variety of computer-assisted machines and products including refrigerators, washing machines, automobiles, HVAC systems, industrial machinery, ovens, security systems, and so on.
- Some computing devices can further include at least one graphical display device and user interfaces, supported by computer processors of the system devices, that allow a user to view and interact with graphical user interfaces of applications and other programs provided in system 100 , including user interfaces and graphical representations of programs interacting with applications hosted within the system devices as well as graphical user interfaces associated with application management server services and other applications, etc.
- system devices may be described in terms of being used by one user, this disclosure contemplates that many users may use one computer or that one user may use multiple computers.
- FIG. 1 is described as containing or being associated with a plurality of elements, not all elements illustrated within computing environment 100 of FIG. 1 may be utilized in each alternative implementation of the present disclosure. Additionally, one or more of the elements described in connection with the examples of FIG. 1 may be located external to computing environment 100 , while in other instances, certain elements may be included within or as a portion of one or more of the other described elements, as well as other elements not described in the illustrated implementation. Further, certain elements illustrated in FIG. 1 may be combined with other components, as well as used for alternative or additional purposes in addition to those purposes described herein.
- example subsystems of a computing device are illustrated including elements responsible for managing various storage capabilities of the device.
- a user mode 205 of the device traditional applications 210 , disk utilities, security software, etc. ( 215 , 220 ) can be provided.
- the kernel mode 225 of the device can include file system 230 , volume manager 235 , partition manager 240 , disk class driver 245 , and storage bus driver 250 .
- Modern malware has been known to exploit each level (e.g., 230 , 235 , 240 , 245 , 250 ) of the kernel mode 225 including the storage bus driver 250 and other elements sitting at the bottom-most layer of the stack.
- traditional disk access controls and security tools do not protect at the storage bus driver level. Implementations applying principles of the example system 100 described above can address several of the shortcomings and issues of traditional disk access control systems.
- Disk access security agent 115 interfacing with various storage devices (e.g., 325 , 330 , 335 ) at various levels of the software stack including chipset-based storage devices (e.g., 325 ), host-based storage devices (e.g., 330 ), as well as solid state drive (SSD) devices (e.g., 335 ) using a common API 120 .
- Disk access security agent 115 can be utilized in connection with secure storage functionalities available at secure-storage-enabled storage devices (e.g., 325 , 330 , 335 ), including at the storage port (or storage bus) driver level.
- host-based secure storage can be provided at the lowest level of the software stack, such as in an RST driver or controller driver. Host-based secure storage can function potentially across multiple hard disks and storage devices. Secure storage can additionally or alternatively be implemented at the chipset level, for instance, at the device communication bus level. In still another example, such secure storage functionality can additionally or alternatively be implemented at the disk level, such as in firmware of a computing device's solid-state drive (SSD), among other examples.
- a common API 120 can be defined allowing for disk access security agent 115 to control storage security at any one of the host-based, chipset-based, and/or firmware based levels. Such an API 120 can abstract the interface to each of these three technologies and provide a common set of functionality that can be utilized at the direction, for example, of the disk access security agent 115 communicating with these storage security technologies over the common API.
- a unified secure storage API, or common API 120 can encompass the functionality of host-, firmware- and chipset-based implementations of a secure storage solution.
- Such an API 120 can additionally be used to obtain a listing of which secure-storage-enabled storage devices are available on a system as well as query each device's secure storage capabilities (e.g., whether the device includes host-, firmware- and/or chipset-based implementations of a secure storage solution).
- the API can further allow a disk access security agent 115 , for instance, to create, apply, and manage separate policies for each individual device, such as policies used by higher-level and user mode security tools.
- native APIs 305 a , 305 b , 305 c providing interfaces to the particular secure storage functionality of a particular secure-storage-enabled storage device.
- each of a chipset-based secure storage device 325 , host-based secure storage device 330 , and secure SSD 335 can have a corresponding native API ( 305 a , 305 b , 305 c respectively).
- Common API 120 can act as a translator of commands and instructions received through or by disk access security agent 115 into instructions compatible with a respective, corresponding native API (e.g., 305 a - c ) of the target secure storage device (e.g., 325 , 330 , 335 ).
- disk access security agent 115 can include logic for accessing and communicating through native APIs 305 a - c directly. Alternative implementations of a disk access security agent 115 can forego use of a common API 120 , in some examples, among other potential implementations. Hardware and/or software-implemented logic can manage access to particular secure storage devices and native APIs 305 a - c can provide interfaces to such logic.
- chipset logic 310 can provide secure storage functionality implemented at the chipset level for one or more storage devices (e.g., 325 ), storage port driver 325 can be used to provide secure storage functionality implemented at the host level for one or more storage devices (e.g., 330 ), and SSD firmware 348 (or alternatively middleware 320 ) can manage SSD 335 .
- respective secure storage logic 340 , 345 , 350 can be provided to facilitate the particular secure storage functionality with which the respective secure storage device is to be enabled, such as logic for implementing read and write blocks, false data reads, false write successes, COW, SAW, direct read, direct write, and so on.
- a native, or kernel mode, API can be provided in a statically linked library maintained, for instance, by one or more hardware and/or security providers. User mode APIs may be omitted in some instance.
- the library in some instances, can be statically linked to a system's lower-class filter driver, among other examples.
- API function definitions can evolve over time as new secure storage capabilities are developed and native APIs and the common API can be extended to support such additional capabilities.
- Example implementations of a common API can provide multiple, simultaneous device support in that the common, unified API supports management of each storage device available on the system that includes functionality compatible with the API.
- a disk access security agent can communicate with each storage device individually through the same common API.
- multiple secure storage technologies can be applied simultaneously on a single storage device (e.g., through host-based secure storage support over a firmware based secure storage drive, etc.).
- the disk access security agent may have access to the combined superset of the capabilities present on a given storage device.
- Some implementations of the disk access security agent can be configured to query and configure combined feature sets in some implementations, rather than defining the combined feature sets in the common API, as in some alternate implementations.
- Such management can include, for instance, protecting against conflicts between potentially multiple secure vaults present on the same device (e.g., one secure vault for the host-based solution, one for the firmware based solution and one for the chipset-based solution, etc.).
- a common API may use a handle (or other identifier) to identify a target storage device and the respective secure storage technology to which the API call applies. This can allow for the configuration of specific devices and, in the case of callbacks, identification of the source device.
- Installation and provisioning tasks can additionally be provided, through one or more APIs, including in some examples a user mode library.
- the installer module for example, on a disk access security agent controlling storage devices of a system, can carry out various installation and provisioning tasks, such as those described herein. For example, a list of secure-storage-enabled storage devices can be queried to discover such devices.
- a capability query can be performed to identify a list of secure storage capabilities for each device (and hardening level) on the system so as to install appropriate point product features. Further, in addition to the capabilities return, for instance, from a native or kernel API query, additional attributes of a storage device can be identified, such as whether the storage device has already been provisioned. Further, an example installer module can be capable of upgrading, for instance, a disk access security agent and/or class filter driver used in the implementation of the disk access security agent if an installation package contains a newer version than what is currently installed, among other examples. Accordingly, packaging disk access security agent with point products and providing disk access security agent upgrade capabilities can provide convenience and save users from the additional step of manually updating the disk access security agent, among other examples. In some implementations, the installer module can be capable of running silently, with no user interface, using input values specified on the command line and hardcoded defaults, among other examples.
- Provisioning can be tightly integrated with installation and relate to the process of allocating reserved space on a storage device disk for a secure vault, among other examples. Additionally, provisioning can include obtaining of encryption/authentication keys to be used in communications, for instance, between the storage device and an agent or other programs.
- An example installer can initiate creation of a secure vault on every device utilizing secure storage capabilities as well as at each secure storage implementation (or hardening level) being utilized on the device. This can serve to create storage for logs, backup data (e.g., for copy-on-write's and save attempting write's), encryption keys, sensitive user/application data, whitelists, blacklists, data loss prevention (DLP) data, DAT file storage, etc., as well as secure storage for metadata generated and used by the storage device.
- the installer may specify space for application-defined storage.
- Secure vault creation can include preparing the disk (i.e., secure-storage-enabled storage device), either through repartitioning or shrinking the reported disk capacity. Initialization tasks can be performed on the secure vault, such as segmenting it for multiple uses (logging, backups, application data) and potentially installing a file system. Provisioning can further include provisioning of authentication credentials. Provisioning can be possible in an environment without an Internet connection, in some implementations, such as where a provisioning server is available on the local intranet, among other examples.
- Authentication credentials can be provisioned. Credentials can be provisioned differently for various secure storage technologies. For instance, in one implementation, firmware based secure storage can rely on SIGMA protocol or other encryption techniques while host-based secure storage utilizes host-based encryption schemes services.
- the deprovisioning can also be performed, for instance, by the installer module, including the complete wiping of a designated secure vault storage before returning the disk space to the system.
- a mechanism can be provided for provisioning the new storage device, for instance, through a user mode service process that communicates with disk access security agent, among other example implementations. The disk access security agent can then discover the newly provisioned storage device during the disk access security agent's normal initialization process.
- a secure vault can be regarded as a multipurpose storage area that can be subdivided, for instance with various sections, such as sections for log storage, backup storage (for the “copy on write” and “save attempted write” actions), application defined storage (e.g., as managed by the agent), storage device metadata, among other implementations.
- storage device metadata can be hidden from visibility of the disk access security agent.
- the size of the secure vault can be specified at provisioning time. If the particular secure storage implementation utilizes additional reserved space for storage device metadata then that can be handled implicitly by the secure vault provisioning API. Further, communication to and from a secure vault can be encrypted so as to block visibility of the data to external actors.
- data at rest in the secure vault can be either encrypted or otherwise hidden to external actors outside of an authenticated secure channel.
- encryption keys utilized to encrypt the secure vault can be managed and changed periodically, or in response to determining that the secure vault and/or its encryption has somehow been compromised. This can, in some implementations, result in the decryption and re-encryption of the secure vault data.
- the disk access security agent can possess functionality for specifying the size limits of secure vault subdivisions (log, backup and application-defined storage) as well as other configurations at creation time.
- size limit specified for a secure vault may be static while in other implementations dynamic resizing of the secure vault can be facilitated, for instance, to allow for expansion of the secure vault without deprovisioning/reprovisioning and potential loss of secure vault data (including backups and log entries) and policies.
- the reserved space of the secure vault can be represented to users, such as by reducing the reported capacity of the drive so that the secure vault is completely invisible, displaying the secure vault space as a separate partition, or displaying the secure vault as a file within the file system, among other examples.
- Additional steps can be performed by a disk access security agent in connection with initialization of storage devices employing secure storage capabilities.
- the disk access security agent can be monitoring the initialization of storage devices without the use of the common API.
- a capabilities query can additionally return information such as a version number corresponding to the secure storage implementation of a detected storage device.
- the current secure storage device configuration can be queried, for instance, to examine the persistent settings at start up time.
- the disk access security agent can query a storage device's power cycle counter, for instance, to determine if the drive has been used, for instance, while the disk access security agent was unavailable or disconnected.
- the disk access security agent can perform an integrity check to ensure the system is clean and that any persistent policy settings are still valid.
- the disk access security agent can be used to detect whether there has been any unexpected communication with a particular storage device since the disk access security agent was last running, including policy changes affecting the common API, direct read operations, direct write operations, secure vault accesses, among other examples. Further, two-way, mutual authentication can be supported between the disk access security agent and a supported secure storage device.
- a disk access security agent 115 can interface with any one of a variety of implementations of secure-storage-enabled storage devices.
- secure storage features 410 of disk access security agent 115 can be supported or at least partially implemented through a class filter driver 405 corresponding to the disk access security agent 115 .
- Class filter driver 405 can be statically linked with common API 120 to pass commands from disk access security agent 115 to host-based secure storage logic 345 , SSD-based secure storage logic 350 , etc.
- Synchronous operation can be supported, for example, operations can complete before the API returns and the return status can indicate success or failure of the operation.
- Callbacks to asynchronous event notifications can be provided and disk locations, in some implementations, can be expressed in logical block addressing (LBA), with file to LBA mapping completed, for instance, utilizing Windows (or other) API calls, among other example implementations.
- LBA logical block addressing
- a variety of services can be provided in connection with secure storage enabled storage devices and disk access security agents. For instance, deep and trusted disk monitoring can be carried out, as well as data access protection. In some implementations, self-protection and early detection functions can be supported, as well as disk-level remediation, provision of secure storage space, among other features. For instance, a set of features can be enabled for hardened system protection, detection, and remediation. Storage block and file lockdown can be realized, for instance, by failing write attempts to locked disk blocks (e.g., MBR, recover OS protection, etc.). In another example, storage block and file level monitoring can be facilitated with write attempts to “watched” disk blocks and files reported (synchronously) to a cooperating disk access security agent.
- locked disk blocks e.g., MBR, recover OS protection, etc.
- Advanced disk monitoring functionality can also be enabled based on a secure storage device and disk access security agent implementation.
- disk regions can be defined as “protected” and subject to monitoring and access control according to one or more corresponding policies.
- Monitoring can include the monitoring of various type of data access attempts, include read attempt, write attempts, TRIM (SSD) attempts, etc.
- monitoring at the lowest level of the software stack through a secure storage enabled storage device can allow intelligence to be gathered and called-back to the disk access security agent allowing for additional functionality and features, such as attribution, blacklisting and whitelisting (based on attribution results and historical trends of various actors), runtime decision-making (e.g., regarding access to data on the storage device), etc.
- a disk access security agent can issue commands to the storage device, for instance, over a common API triggering the performance of various operations (e.g., in accordance with the enforcement of one or more relevant policies identified by the agent) such as copy on write operations, save attempt read operations, false data read operation, logging (e.g., to supplement intelligence capable of being analyzed, at least in part, using the agent), among other examples.
- a secure storage device and disk access security agent implementation can provide “always on” protection. For example, when the disk access security agent is active, or interfacing with other security management services, dynamic and online security policies, real-time decision-making, and real-time notification services can be facilitated through the disk access security agent based upon information identified and conveyed by the secure storage device monitoring read/write operations at the storage port driver level, or lowest layer of the software stack.
- disk access security agent or storage device
- protection can still be provided, for instance, through off-line policies allowing protection early in the boot cycle of the device via prevention, detection, and remediation operations capable of being performed by the storage device directly at the boot loader level (e.g., to protect against bootkit attacks, etc.).
- Off-line protection can even extend, in some examples, when a storage device is moved to another machine (e.g., in firmware-based secure storage implementations), among other examples.
- a storage device can enjoy a true view of its disk contents.
- direct read and direct write operations can be completed by the storage device, for instance, at the direction of a disk access security agent interfacing with the storage device via a defined API.
- Direct read and direct write operations can be useful, for example, because they cannot be blocked or altered or otherwise interfered with by other programs, including malware, in the disk stack.
- Such operations can be useful, for instance, in connection with such tasks as remediation, integrity checking (e.g., hash calculations), high/low comparisons of file data, among other examples.
- FIGS. 5A-5B simplified representations are illustrated of example operations that can be performed using a secure storage enabled storage device, for instance, in connection with or at the direction of an example disk access security agent.
- a particular data record or range of data records e.g., 505
- Such protected or monitored records can be determined or specified in connection with operation and services of one or more security tools protecting such data and interfacing, for example, with an example disk access security agent.
- suspicious behavior may be detected (e.g., through attribution analysis) in connection with the detected range of data records.
- An attempt to learn more about the data records 505 can be initiated, for example, to determine whether a file within the range 505 is malware, among other examples.
- a system read such as a read of the data records 505 by a sensor or application operating at a higher level of the software, such as through the file system, may be presented with a spoofed or false representation of the contents of data records 505 .
- the integrity of this response can be checked, for instance, utilizing direct read functionality provided to the storage device.
- the direct read can read the data records 505 , bypassing the disk stack and influence of the file providing the false representation of data records 505 in order to obtain the true and actual contents of the range of data records 505 .
- it is identified that the response to the system-level read was falsified based on a comparison of that response with the results of a direct read.
- the direct read may be triggered through the disk access security agent and other security management tools (interfacing with the disk access security agent) and analyzing the nature of the file (e.g., antivirus or anti-malware tools, etc.). Through the direct read, this abnormality can be detected and be considered along with other factors in determining whether the range of data records 505 houses malware or other malicious content, among other examples.
- direct write operability of the storage device can be triggered by a disk access security agent and employed to remediate detected problems within an identified range of data records (e.g., 505 ) on the disk.
- a disk access security agent employed to remediate detected problems within an identified range of data records (e.g., 505 ) on the disk.
- one or more security management tools such as the tools detecting that data records 505 correspond with malware on the device, may request (through a disk access security agent) that the data records 505 be remediated.
- initial remediation attempts may be pursued utilizing traditional remediation technology.
- direct write functionality can be employed to directly access the data record utilizing the storage device (e.g., via the direction of the disk access security agent interfacing with the storage device via the common API) and directly overwrite (e.g., using copy on write backup data) or delete the target data records 505 and remediate the issue.
- directly overwrite e.g., using copy on write backup data
- a lock can be requested and applied to the identified region 505 of the disk to protect against that region being re-infected, among other examples.
- a security device at the direction of a disk access security agent, can perform lockdowns of ranges of data records, including LBA range lockdowns.
- a subset of ranges can be designated as monitored, important, or protected. Varying policies, monitoring techniques, and protection techniques can be further designated for the various subsets of ranges. For example, separate policies can be definable for each type of access (e.g., Write, Read and TRIM).
- File-to-LBA mapping can be performed by the disk access security agent. Further, each LBA range can allow metadata to be specified for the purpose of mapping event and log data back to the file system entities that are being accessed.
- the metadata can be defined and provided by the disk access security agent and can accompany all logging, eventing (callbacks), and backup data associated with access to the respective LBA range.
- the disk access security agent can associate this metadata with an LBA-to-filename mapping and possibly some additional context data, among other examples.
- protection ranges may not be permitted to overlap. In other implementations, protection ranges are not so restricted. For instance, when multiple secure storage technology implementations are in use on the same device, the disk access security agent can be allowed to configure different policies for the same or overlapping LBA range for each implementation. For instance, one implementation may possess more desirable or effective remediation functionality, allowing for the more effective implementation to have precedents in cases where protection ranges theoretically overlap and/or interfere.
- secure storage devices For each LBA range that is configured for monitoring, secure storage devices can be presented (e.g., by the disk access security agent) with corresponding actions to take when access to that range is attempted.
- multiple actions can be defined in response to particular detected events, such as identified access attempts of the protected range. For instance, if one of the proscribed actions fails (such as Copy-On-Write), this may not alter the other defined actions (such as block/allow). Failures can be logged, in some implementations, but then the other actions should proceed as normal.
- policies can define actions that apply for the same LPA range to “online mode”, when the disk access security agent has a registered callback, or “off-line mode” when the disk access security agent is not available.
- Callbacks can be used between the storage device and the disk access security agent to coordinate the performance of actions at the storage device. For example, a callback routine in the disk access security agent can be invoked to process an event and the callback can return, in response, the actions that should be performed by the secure storage device.
- a variety of actions can be returned in connection with a synchronous callback from a disk access security agent. Indeed, a combination of actions can be returned. Such actions can include, for example, for “read” events: an allow or block of the read; performance of a false data read and return of a modified view of the data; log details of the read event, among other examples.
- read any combination of the following may be returned: the write can be allowed, blocked, or blocked with a returned ‘fake’ success; copy-on-write operation; save-attempted-write operation; logging of the write event, among other examples.
- trim any combination of the following may be returned: allow or block of the trim; copy-on-write; logging of the trim event, among other examples.
- the original read/write event may be held in a PENDING state while the synchronous callback is processed.
- policies can provide for actions configured for “offline” mode when the disk access security agent is not available.
- read events any combination of the following can be performed: allow or block of the read; logging details of the read event, among other examples.
- write events any combination of the following can be provided: the write can be allowed, blocked, or blocked with a returned ‘fake’ success; copy-on-write operation; save-attempted-write operation; logging of the write event, among other examples.
- trim events any combination of the following may be returned: allow or block of the trim; copy-on-write; logging of the trim event, among other examples.
- a disk access security agent can register a status callback for receiving notifications (errors or other status) from a secure storage enabled storage device. Such notifications can identify important conditions such as that backup storage or secure vault is full, among other examples. Further, in some examples, the following information can be provided to the callback routines: LBA range being accessed, LBA range metadata that was specified during configuration, type of access being requested (read/write/trim), contents being written (if applicable), SRB, IRP or similar pointer used for the disk access (to aid the agent in matching the low-level I/O to a higher level request, and ultimately the process that initiated the I/O). Further, the callback can, in some instances, modify the data being written/read.
- Logging can include the logging, as well as the maintaining and accessing, of information such as an indication of the LBA range being accessed, the LBA range metadata that was specified during configuration, the type of access being requested (read/write/trim), an indication as to whether the access was allowed or blocked, the offset and length of data being read/written, a timestamp (or a mechanism that allows the agent to infer a timestamp from the storage drive's timing counters), among other potential examples.
- the log data can be stored in a designated section of the secure vault.
- Logging can include, for instance, violation reports (when particular monitored/protected LBA ranges are accessed) and status/error notices, for instance, from the storage device.
- Such error notices can include, for example, notices indicating that the secure vault's backup space is exhausted or that the secure storage device timed-out while waiting for the disk access security agent's callback to process an event, etc.
- the log can be treated as a circular buffer. When a size limit is reached, the oldest entries of the log can be purged with new data continuously appended thereto.
- FIGS. 6A-6C simplified block diagrams are shown illustrating an example copy-on-write (COW) operation.
- portions of a disk can be designated as protected.
- a portion 605 of an example disk is represented as protected.
- an initialization step can be performed to identify important or sensitive files and ranges within the disk storage, such as record ranges corresponding to important operating system files, the boot sector such as a master boot record (MBR), a master file table, and security application files (e.g., for self-protection of the agent and other security service, etc.), among other examples.
- MLR master boot record
- security application files e.g., for self-protection of the agent and other security service, etc.
- Corresponding policies can be applied to various types of protected disk data record ranges.
- write attempts of records (e.g., 610 ) within protected disc ranges (e.g., 605 ) can be subject to policies that trigger an automated copy-on-write operation in response to the read attempt according to one or more applied policies.
- policies that trigger an automated copy-on-write operation in response to the read attempt according to one or more applied policies.
- modern malware may attempt to take control of an overwrite of important operating system and boot sector files.
- malware may lock the overwritten or infected region of the disk, and otherwise resist removal or remediation by traditional techniques and tools.
- a write attempt of protected data records 610 can trigger a backup copy of the data record 610 to be made and stored, for instance, in backup memory.
- the backup copy can reside in a secure vault region of the disk.
- the write attempt can be allowed to proceed and rewrite the data record 610 , as shown in FIG. 68 .
- FIG. 6C it may be later determined that the write attempt to data record 610 should not have occurred, for instance, based on a determination, for example, by one or more security management applications or security tools interfacing with a disk access security agent, that the write attempt corresponded to some suspicious, unstable, or malicious code on the device.
- the backup copy created through the copy-on-write operation can be utilized, through a direct write to the data range 610 , to restore the contents of the written-to data range 610 .
- Copy-on-write operations can be useful in restoring original data during remediation of malware and other undesirable code.
- Copy-on-write data can be maintained in a backup region of the disk, such as in the secure vault. If there is not enough space in the backup area to accommodate new copy-on-write data, other backup data can be overwritten or, in some instances, the copy-on-write operation can be skipped, among other examples. Further, in instances where a disk write attempt extends beyond the monitored LBA range, the copy-on-write operation can backup only the portion of the data corresponding to the LBA range being monitored. For example, if LBA range 100-110 is being monitored but a write attempt is made to range 95-115, then the COW backup should only reflect the data from LBA range 100-110.
- backup entries can be named in a meaningful way so that the disk access security agent can communicate which entries it wants to act on.
- a disk access security agent can be configured to iterate through the list of backups, retrieve the metadata for each, and read the full data for an entry, among other examples.
- FIGS. 7A-7C illustrate an example save-attempted-write (SAW) operation and false data read involving an example secure storage enabled storage device.
- SAW save-attempted-write
- FIG. 7A a write attempt is identified on a data record 705 included in a protected range of data records 710 .
- the write attempt can trigger, according to one or more policies, a save-attempted-write operation.
- a save-attempted-write operation can be taken, for instance, when a suspected malware payload is being written to the disk.
- the data that was attempted to be written can be backed up, for instance, so that more extensive (asynchronous) evaluation of the data can be performed, for example, through further monitoring at the storage device.
- Save-attempted-write data can be stored in a designated section of the secure vault that, in some examples, includes other backup data, for instance, from the copy-on-write operations.
- the save-attempted-write operation can be ordered, for instance, by the disk access security agent, based on intelligence received at the disk access security agent (e.g., from another security tool interfacing with the disk access security agent) that a detected write attempt originates from or relates to a suspected malicious, unstable, or suspicious program, among other examples.
- the program responsible for the original write attempt may attempt to detect whether its actions are being monitored or blocked, for instance, by sending a read back request to verify that its write attempt was allowed and successful. It can be determined, that the detected read back request originates from this program, with the assistance of the disk access security agent and potentially other security management applications.
- a false data read action can be triggered (e.g., according to one or more policies) that responds to the read back request using the save-attempted-write backup data including the contents of the original write attempt.
- a whitelist or blacklist can be consulted to determine whether to provide the read back request or a full view of the data or to trigger a false data read action.
- a false data read action can buy the system additional time to assess the nature of the originating program making the write attempt.
- the agent can request that the storage device implement the original write attempt (of FIG. 7A ) by copying corresponding data from the save-attempted-write backup and writing the data to the target data record 705 (e.g., utilizing a direct write action).
- the SAW operation can be skipped and the existing secure vault data can remain unchanged.
- the SAW action can move forward overwriting older backup data.
- a failure to perform a save-attempted-write action can be reported to the log.
- the save-attempted-write may backup only the portion of the data corresponding to the LBA range being monitored.
- the operating system can provide a numerically addressable abstraction of the storage device to the low level drivers like the storage bus driver, disk class filter driver and any filter drivers on the disk class driver.
- the address range can range from zero up to the size of the disk in terms of its sectors. Each sector size can be dependent on the formatting scheme of the storage device. Each sector can be addressed by its LBA or logical block address.
- a configuring application e.g., utilizing a disk access security agent
- the policy data in its simplest form can include the type of I/O operation (read/write/both), the starting address of the sector (LBA), and the number of sectors to be protected. Protection can imply that the I/O operation as chosen in the policy is denied by the disk filter driver, if the I/O is in the region of disk defined by the sectors/LBAs in the policy.
- an I/O operation by any application can be defined by one or more of the type of I/O (e.g., READ/WRITE), the disk region it is aimed at (in terms of the sector on the disk), and the size.
- the disk filter therefore, can keep the policy data in its system memory and check it for every I/O operation taking place on the disk. Since the disk filter's check (or look up) operation is in the two path of every application running on the system and the storage device, and the number of policies could be many and be scattered across all the LBAs on the disk, the disk filter's check operation can significantly degrade the performance of the application, the disk access security agent, and the system as whole.
- FIGS. 8A-8B storage media can be considered as a single linearly growing and numerically addressable object of a fixed number of sectors.
- FIG. 8A illustrates a representation of a disk of N sectors. Shaded regions can represent, for example, ranges on the disk defined by starting sector and its length.
- the disk filter driver can store many such ranges along with one or more policies associated with each range governing actions for I/O (or read/write) attempts on the range.
- the number of ranges stored can be very high and it would be suboptimal to store them in data structures with a high or linear order of search.
- a tree structure can be used such as a binary search tree, such as an AVL tree.
- each policy applicable to one or more data records in a range can be, in some implementations, stored as a node record of a single global search tree for the entire disk.
- multiple binary search trees can be provided for a single disk.
- Each defined range can be assigned an associated tree such that each tree has a much smaller depth (and thereby improving the overall look up time).
- the disk can be construed as a collection of sections such as a collection of many equal sized smaller disks (plus a possible unequal last disk) referred to as extents.
- a single AVL (or other binary) tree can be provided and assigned to each extent defined for the disk. Accordingly, each tree only stores policy information for the disk ranges corresponding to its respective extant. In some instances, a particular range may span across multiple extent boundaries, in which case a single range, in some instances, can be broken into multiple ranges and subdivided across the multiple extents such that each portion of the single range is contained within a single extent boundary. Further, each extent specific tree can include nodes identifying policies applicable to data record ranges within the corresponding extent. This can provide for much more efficient searches of the respective trees.
- one or more corresponding extents can be identified that contain the particular data record or range of records.
- corresponding search trees for the extents of the particular data records can be identified and searched to swiftly determine whether policies or protection designations have been defined that apply to the particular data records.
- a bit mask can be maintained that provides a shorthand mechanism for determining whether any policies have been defined for records within a given extent.
- the bit mask can include bits storing the state of “protection ranges” in a given extent. For instance, if a corresponding extent has any number (greater than zero) of protected ranges, its bit can be marked “TRUE”. However, if a given extent has no protected ranges or applied policies, its corresponding bit can be marked “FALSE”.
- extent 805 can include a protected range 815 and its corresponding bit in the bit mask can be set to “1”.
- extents 815 and 825 can also include protected ranges (e.g., 820 , 830 , 835 ) and their corresponding bits can also be set to “1”.
- Other extents (e.g., 840 ) that do not (yet) include protected data ranges can have their bitmask values set to “0”, as shown in the example of FIG. 88 .
- the identification of a particular extent for an identified range of records can first result in a lookup of the bit mask or other indicator to determine whether any protected ranges or policies exist within the extent. If it is determined that no such ranges or policies exist by virtue of the bit mask or other indicator, a search of the corresponding extent search tree can be skipped (and the I/O attempt can proceed seamlessly without extra intervention by the storage device and/or disk access security agent, in some examples).
- the corresponding extent search tree can be identified and searched to determine whether policies or protections are applied to the particular range of records, in some cases triggering the secure storage functionality of the storage device and/or disk access security agent, among other examples.
- FIGS. 9A-9E include flowcharts 900 a - e illustrating example techniques utilizing a secure storage platform based, at least in part, on principles described above.
- a disk access security agent can interface with both one or more security tools and one or more secure-storage-enabled storage devices.
- a request can be received 902 from a security tool relating to data records of one of the storage devices.
- the request can, for example, request a verification or inspection of data on the storage device (e.g., using a direct read), identify a security event such as an attempt to write, read, or otherwise access the storage device, and request a particular security operation or set of security operations to be performed on the storage device utilizing the secure storage functionality of the storage device, in accordance with one or more security policies, among other examples.
- the disk access security agent can interface 904 with the storage device using an API.
- the API can be a common API for use in interfacing with multiple different implementations of secure-storage-enabled storage devices.
- the API can be used to trigger operations offered through the secure storage functionality of the storage device in connection with a response to the request received 902 from the security tool.
- the disk access security agent can cause 906 , for instance, through a call to the API, one or more security operations to be performed at the storage device using the secure storage functionality.
- security operations can be make use of secure storage operations such as a direct read, direct write, false data read, false write success, COW, SAW, logging, record locks, allowing and blocking read and write attempts, among other examples.
- a locked or otherwise protected data record can be identified 908 in a secure-storage-enabled storage device.
- a direct read can be caused to be performed 910 to identify the actual values at the storage device directly from the storage device.
- the identified values can be communicated 912 to a security tool and instructions to modify the values of the record can be received 914 from the security tool in response.
- a direct write of the data records can be caused to be performed 916 to rewrite the actual values of the data record with values different from those returned in the results of the direct read.
- an attempted to write to one or more data records of a secure-storage-enabled storage device is identified 918 (e.g., from a communication from a security tool monitoring at least portions of the records of the storage device). It can be identified 920 that the particular data record is protected or that one or more security policies apply to the particular data record.
- a security operation can be performed 922 , such as a copy-on-write operation to create a copy of the contents of the data record prior to allowing the write attempt to write new data to the particular data record.
- the copied data can be backed-up in a COW data record and used to restore the values of the particular data record, for instance, through a direct write of the data back to the particular data record.
- an attempted write of a particular data record of a secure-storage-enabled storage device can be identified 924 and trigger a SAW operation, for instance, based on a request or communication from a security tool identifying that the write attempt may be of a malicious or untrusted nature.
- the data that is attempted to be written in the attempted write can be saved 926 by writing the data to backup storage, such as a SAW data record.
- the SAW data record can then be used 928 , for instance, to analyze the nature and source of the write attempt and determine whether the write attempt is or is not associated with malware, an error, or other undesirable condition.
- an attempted I/O operation can be identified 930 involving a particular data record of a storage device.
- a particular portion (e.g., an extent) of the storage device can be identified 932 that corresponds to the particular data record, such as a portion of the storage device in which the particular data record is located.
- a lookup tree structure can be identified 934 in a set of lookup tree structures that corresponds to the identified portion of the storage device. The lookup tree can then be used 936 to determine whether policies, rules, or functionality apply to the particular data record.
- determining that one or more policies or rules apply to the particular data record can trigger one or more secure storage operations to be performed at the direction of a disk access security agent, such as a COW operation, SAW operation, false data read operation, false write success operation, blocking of the I/O operation, and so on.
- a disk access security agent such as a COW operation, SAW operation, false data read operation, false write success operation, blocking of the I/O operation, and so on.
- FIGS. 10-12 are block diagrams of exemplary computer architectures that may be used in accordance with embodiments disclosed herein. Other computer architecture designs known in the art for processors, mobile devices, and computing systems may also be used. Generally, suitable computer architectures for embodiments disclosed herein can include, but are not limited to, configurations illustrated in FIGS. 10-12 .
- FIG. 10 is an example illustration of a processor according to an embodiment.
- Processor 1000 is an example of a type of hardware device that can be used in connection with the implementations above.
- Processor 1000 may be any type of processor, such as a microprocessor, an embedded processor, a digital signal processor (DSP), a network processor, a multi-core processor, a single core processor, or other device to execute code. Although only one processor 1000 is illustrated in FIG. 10 , a processing element may alternatively include more than one of processor 1000 illustrated in FIG. 10 . Processor 1000 may be a single-threaded core or, for at least one embodiment, the processor 1000 may be multi-threaded in that it may include more than one hardware thread context (or “logical processor”) per core.
- DSP digital signal processor
- FIG. 10 also illustrates a memory 1002 coupled to processor 1000 in accordance with an embodiment.
- Memory 1002 may be any of a wide variety of memories (including various layers of memory hierarchy) as are known or otherwise available to those of skill in the art.
- Such memory elements can include, but are not limited to, random access memory (RAM), read only memory (ROM), logic blocks of a field programmable gate array (FPGA), erasable programmable read only memory (EPROM), and electrically erasable programmable ROM (EEPROM).
- RAM random access memory
- ROM read only memory
- FPGA field programmable gate array
- EPROM erasable programmable read only memory
- EEPROM electrically erasable programmable ROM
- Processor 1000 can execute any type of instructions associated with algorithms, processes, or operations detailed herein. Generally, processor 1000 can transform an element or an article (e.g., data) from one state or thing to another state or thing.
- processor 1000 can transform an element or an article (e.g., data) from one state or thing to another state or thing.
- Code 1004 which may be one or more instructions to be executed by processor 1000 , may be stored in memory 1002 , or may be stored in software, hardware, firmware, or any suitable combination thereof, or in any other internal or external component, device, element, or object where appropriate and based on particular needs.
- processor 1000 can follow a program sequence of instructions indicated by code 1004 .
- Each instruction enters a front-end logic 1006 and is processed by one or more decoders 1008 .
- the decoder may generate, as its output, a micro operation such as a fixed width micro operation in a predefined format, or may generate other instructions, microinstructions, or control signals that reflect the original code instruction.
- Front-end logic 1006 also includes register renaming logic 1010 and scheduling logic 1012 , which generally allocate resources and queue the operation corresponding to the instruction for execution.
- Processor 1000 can also include execution logic 1014 having a set of execution units 1016 a , 1016 b , 1016 n , etc. Some embodiments may include a number of execution units dedicated to specific functions or sets of functions. Other embodiments may include only one execution unit or one execution unit that can perform a particular function. Execution logic 1014 performs the operations specified by code instructions.
- back-end logic 1018 can retire the instructions of code 1004 .
- processor 1000 allows out of order execution but requires in order retirement of instructions.
- Retirement logic 1020 may take a variety of known forms (e.g., re-order buffers or the like). In this manner, processor 1000 is transformed during execution of code 1004 , at least in terms of the output generated by the decoder, hardware registers and tables utilized by register renaming logic 1010 , and any registers (not shown) modified by execution logic 1014 .
- a processing element may include other elements on a chip with processor 1000 .
- a processing element may include memory control logic along with processor 1000 .
- the processing element may include I/O control logic and/or may include I/O control logic integrated with memory control logic.
- the processing element may also include one or more caches.
- non-volatile memory such as flash memory or fuses may also be included on the chip with processor 1000 .
- Mobile device 1100 is an example of a possible computing system (e.g., a host or endpoint device) of the examples and implementations described herein.
- mobile device 1100 operates as a transmitter and a receiver of wireless communications signals.
- mobile device 1100 may be capable of both transmitting and receiving cellular network voice and data mobile services.
- Mobile services include such functionality as full Internet access, downloadable and streaming video content, as well as voice telephone communications.
- Mobile device 1100 may correspond to a conventional wireless or cellular portable telephone, such as a handset that is capable of receiving “3G”, or “third generation” cellular services. In another example, mobile device 1100 may be capable of transmitting and receiving “4G” mobile services as well, or any other mobile service.
- Examples of devices that can correspond to mobile device 1100 include cellular telephone handsets and smartphones, such as those capable of Internet access, email, and instant messaging communications, and portable video receiving and display devices, along with the capability of supporting telephone services. It is contemplated that those skilled in the art having reference to this specification will readily comprehend the nature of modern smartphones and telephone handset devices and systems suitable for implementation of the different aspects of this disclosure as described herein. As such, the architecture of mobile device 1100 illustrated in FIG. 11 is presented at a relatively high level. Nevertheless, it is contemplated that modifications and alternatives to this architecture may be made and will be apparent to the reader, such modifications and alternatives contemplated to be within the scope of this description.
- mobile device 1100 includes a transceiver 1102 , which is connected to and in communication with an antenna.
- Transceiver 1102 may be a radio frequency transceiver.
- wireless signals may be transmitted and received via transceiver 1102 .
- Transceiver 1102 may be constructed, for example, to include analog and digital radio frequency (RF) ‘front end’ functionality, circuitry for converting RF signals to a baseband frequency, via an intermediate frequency (IF) if desired, analog and digital filtering, and other conventional circuitry useful for carrying out wireless communications over modern cellular frequencies, for example, those suited for 3G or 4G communications.
- RF radio frequency
- IF intermediate frequency
- Transceiver 1102 is connected to a processor 1104 , which may perform the bulk of the digital signal processing of signals to be communicated and signals received, at the baseband frequency.
- Processor 1104 can provide a graphics interface to a display element 1108 , for the display of text, graphics, and video to a user, as well as an input element 1110 for accepting inputs from users, such as a touchpad, keypad, roller mouse, and other examples.
- Processor 1104 may include an embodiment such as shown and described with reference to processor 1000 of FIG. 10 .
- processor 1104 may be a processor that can execute any type of instructions to achieve the functionality and operations as detailed herein.
- Processor 1104 may also be coupled to a memory element 1106 for storing information and data used in operations performed using the processor 1104 . Additional details of an example processor 1104 and memory element 1106 are subsequently described herein.
- mobile device 1100 may be designed with a system-on-a-chip (SoC) architecture, which integrates many or all components of the mobile device into a single chip, in at least some embodiments.
- SoC system-on-a-chip
- FIG. 12 illustrates a computing system 1200 that is arranged in a point-to-point (PtP) configuration according to an embodiment.
- FIG. 12 shows a system where processors, memory, and input/output devices are interconnected by a number of point-to-point interfaces.
- processors, memory, and input/output devices are interconnected by a number of point-to-point interfaces.
- one or more of the computing systems described herein may be configured in the same or similar manner as computing system 1200 .
- Processors 1270 and 1280 may also each include integrated memory controller logic (MC) 1272 and 1282 to communicate with memory elements 1232 and 1234 .
- memory controller logic 1272 and 1282 may be discrete logic separate from processors 1270 and 1280 .
- Memory elements 1232 and/or 1234 may store various data to be used by processors 1270 and 1280 in achieving operations and functionality outlined herein.
- Processors 1270 and 1280 may be any type of processor, such as those discussed in connection with other figures.
- Processors 1270 and 1280 may exchange data via a point-to-point (PtP) interface 1250 using point-to-point interface circuits 1278 and 1288 , respectively.
- Processors 1270 and 1280 may each exchange data with a chipset 1290 via individual point-to-point interfaces 1252 and 1254 using point-to-point interface circuits 1276 , 1286 , 1294 , and 1298 .
- Chipset 1290 may also exchange data with a high-performance graphics circuit 1238 via a high-performance graphics interface 1239 , using an interface circuit 1292 , which could be a PtP interface circuit.
- any or all of the PtP links illustrated in FIG. 12 could be implemented as a multi-drop bus rather than a PtP link.
- Chipset 1290 may be in communication with a bus 1220 via an interface circuit 1296 .
- Bus 1220 may have one or more devices that communicate over it, such as a bus bridge 1218 and I/O devices 1216 .
- bus bridge 1218 may be in communication with other devices such as a keyboard/mouse 1212 (or other input devices such as a touch screen, trackball, etc.), communication devices 1226 (such as modems, network interface devices, or other types of communication devices that may communicate through a computer network 1260 ), audio I/O devices 1214 , and/or a data storage device 1228 .
- Data storage device 1228 may store code 1230 , which may be executed by processors 1270 and/or 1280 .
- any portions of the bus architectures could be implemented with one or more PtP links.
- the computer system depicted in FIG. 12 is a schematic illustration of an embodiment of a computing system that may be utilized to implement various embodiments discussed herein. It will be appreciated that various components of the system depicted in FIG. 12 may be combined in a system-on-a-chip (SoC) architecture or in any other suitable configuration capable of achieving the functionality and features of examples and implementations provided herein.
- SoC system-on-a-chip
- One or more embodiments may provide an apparatus, a system, a machine readable storage, a machine readable medium, and a method to receive a request from a security tool relating to an event involving data records in a storage device, use an application programming interface (API) to interface with secure storage functionality of the storage device enabling a set of secure storage operations, and cause a security operation to be performed at the storage device involving the data records based at least in part on the request.
- API application programming interface
- the API can facilitate a set of secure storage functionality common to each of a host-based secure storage capability, a chipset-based secure storage capability, and the firmware-based secure storage capability.
- the set of secure storage operations can include a direct read operation.
- the security operation can include a direct read of a particular one of the data records. Content of the particular data obtained through the direct read can be communicated to the security tool, and causing the security operation to be performed can include causing the particular data record to be rewritten through a direct write operation.
- the set of secure storage operations can include a direct write operation.
- the set of secure storage operations can include a copy-on-write operation.
- the security operation can include a copy-on-write operation and causing the security operation to be performed can include causing an attempted write operation of a particular one of the data records to be identified and data of the one or more data records to be copied to a copy-on-write backup prior to allowing the attempted write operation.
- causing the security operation to be performed can include causing the particular data record, following the attempted write operation, to be remediated by replacing data of the written-to particular data record with data of the copy-on-write backup.
- the data of the written-to particular data record can be replaced with the data of the copy-on-write backup through a direct write operation.
- the set of secure storage operations can include a save-attempted-write operation.
- the security operation can include a save-attempted-write operation
- the request can be used to identify an attempted write operation of a particular one of the data records
- causing the security operation to be performed can include causing the attempted write operation to be saved by disallowing the attempted write operation on the particular record and causing the write operation to be performed instead on a save-attempted-write (SAW) record.
- SAW save-attempted-write
- causing the security operation to be performed can include causing a response to be generated to a read-back request of the particular data record with a false data read incorporating contents of the written-to SAW record.
- causing the security operation to be performed can include causing the attempted write operation to be allowed after saving the attempted write operation, and using contents of the SAW record to allow the attempted write operation.
- the set of secure storage operations can include a false data read operation.
- the set of secure storage operations can include a data range lockdown operation.
- the set of secure storage operations can include each of a direct read operation, a direct write operation, an allow write operation, and a block write operation.
- the set can further include a false data read operation and a false write success operation.
- feedback data can be received from the secure storage device via the API, the feedback data describing results of the security operation.
- the feedback data can be included in a callback, a log generated by the secure storage platform, or another form.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This disclosure relates in general to the field of computer security and, more particularly, to malware detection and remediation.
- Storage is precious resource on computing systems. Storage devices of computing systems can be repositories not only for application files and data but also critical operating system files, and critical high-value data, including sensitive personal data, among other examples. Root kits, viruses, and other malware attacks have been known to target storage devices such as the boot loader (e.g., a master boot record (MBR)), file systems, disk regions, etc. of a storage device. Examples of such malicious programs include TDL4, Trojan.Mebroot, Popureb.E, Max++, among others. Such malicious programs can manipulate system storage to create room for their persistence, create private file systems or storage partitions, commit data theft, data leak, and data loss, among other examples.
-
FIG. 1 is a simplified schematic diagram of an example system including an example disk access security agent; -
FIG. 2 is a simplified block diagram of an example system including an example storage device; -
FIG. 3 is a simplified block diagram representing aspects of an example system including an example disk access security agent and common API; -
FIG. 4 is a simplified block diagram representing interactions between an example disk access security agent and example secure-storage-enabled storage devices; -
FIGS. 5A-5B are simplified block diagrams representing example secure storage operations; -
FIGS. 6A-6C are simplified block diagrams representing example secure storage operations; -
FIGS. 7A-7C are simplified block diagrams representing example secure storage operations; -
FIGS. 8A-8B are simplified representations of data records in an example secure-storage-enabled storage device; -
FIGS. 9A-9E are flowcharts representing example techniques involving an example disk access security agent; -
FIG. 10 is a block is a block diagram of an exemplary processor in accordance with one embodiment; -
FIG. 11 is a block diagram of an exemplary mobile device system in accordance with one embodiment; and -
FIG. 12 is a block diagram of an exemplary computing system in accordance with one embodiment. - Like reference numbers and designations in the various drawings indicate like elements.
-
FIG. 1 illustrates anexample system 100 including, for instance, anexample computing device 105 having a diskaccess security agent 115 capable of interfacing with and controlling one or more storage devices (e.g., 110) utilized by thecomputing device 105. A diskaccess security agent 115, in some implementations, can control operations and logic available at the storage device level (e.g., 11)) to provide specialized secure storage functionality extending to the lowest layer of a system software stack. The diskaccess security agent 115 can interface with functionality provided on the secure-storage-enabled storage devices (e.g., 110) through one or more APIs (e.g., 120). In one example, a diskaccess security agent 115 can be configured to potentially interface with multiple secure-storage-enabled storage devices through a single,common API 120, among other potential examples. - In some implementations, disk
access security agent 115 can further interface with and connect to security management tools (e.g., 125), including suites of security tools, providing high-level security assessment and policy management services. Such security tools (e.g., 125) can include, for instance, host intrusion prevention systems, anti-malware detection and remediation tools, data access controls and protection, among other examples. Further, a variety of security policies (e.g., 130) can be defined and managed through outside (e.g., remote and/or third-party) security management tools (as well as security tools present on the computing device 105) to guide the disk access security agent's 115 interactions and control of various storage- or disk-level operations at secure-storage-enabled storage devices (e.g., 110). - In one example implementation, a disk
access security agent 115 can include one ormore processors 132 and one ormore memory elements 134 as well as one or more components providing various functionality, for instance, in connection with the disk access security agent's interaction with storage devices (e.g., 110). In some examples, such components can include anattribution engine 136,access decision engine 138,policy manager 140,intelligence engine 142, self-protection engine 144, early or off-line detection engines 146, among potentially many other examples. In one example implementation, anattribution engine 136 can possess functionality and logic for identifying, from information detected through monitored read/write attempts at astorage device 110, the source of a particular read/write attempt, among other examples. A diskaccess security agent 115, in some instances, can further include anaccess decision engine 138 possessing logic and functionality for determining actions to be taken, for instance, at thestorage device 110, in response to various read/write attempts at the storage device (e.g., based on identification of the source of a particular read/write attempt using attribution engine 136). Again, information can be collected at thestorage device 110 or higher up the software stack describing monitored read/write attempts, this information can be provided to the diskaccess security agent 115 and utilized, for instance, by an exampleaccess decision engine 138 to determine whether the read/write attempt is a legitimate, desired, or trustworthy one, or, in some instances, an unknown or untrustworthy read/write attempt that should be blocked, further analyzed, or otherwise remediated. - A disk
access security agent 115 can, in some examples, further include additional components such as apolicy manager 140. Anexample policy manager 140 can include functionality for receiving, updating, and applying policies, such aspolicies 130 served to the diskaccess security agent 115 via one or moresecurity management tools 125, to read/write attempts of the disk (e.g., storage device 110) with which the diskaccess security agent 115 interfaces (e.g., through a common API 120). Relatedly, anintelligence engine 142 can be provided in some implementations of the diskaccess security agent 115 to gather intelligence from one ormore security tools 125 discovering information relating to attributes of thecomputing device 105, installed applications, hardware configurations, network configurations, known threats and vulnerabilities, among other examples. Intelligence collected through an example intelligence engine and/or through an example policy manager (e.g., based on intelligence gleaned from monitoring of other, similar computing devices, operating systems, applications, etc.) can be used to inform decisions, instructions, and controls of the disk access security agent 115 (e.g., using access decision engine 138) relating to activities of the storage device 110 (or “disk”). Additional components can include, for example, a self-protection module 144, for use in utilizing functions of astorage device 110 to protect files and data utilized by the disk access security agent and/or other security related tools and applications used by the computing device, among other examples. - In some implementations, a
storage device 110 can be configured with logic for performing basic storage management and data read/write operations. Further, secure-storage-enabled storage devices (e.g., 110) can be further configured with functionality to perform functions, in some cases, in conjunction with a diskaccess security agent 115, to realize various secure storage tasks. Astorage device 110 can include (or be utilized with) one ormore processor devices 148, one ormore memory elements 150, as well as one or more components providing functionality for performing various secure storage functionality.Storage device 110 can be a repository forvarious data 170 andbackup data 175. In some examples,storage device 110 can store sensitive data including operating system files, local security tool files, the master boot record (MBR), volume boot record (VBR), among other examples. - A secure-storage-enabled storage device (e.g., 110) can include logic that can enable robust, storage-device operations and checks, such as, for example,
logic 152 enabling direct or trusted read capabilities allowing the storage device to bypass the disk stack file system and read directly from the data records on the storage device. Similarly, an example storage device can possesslogic 156 for performing direct trusted writes on its data. In some implementations, a storage device can possesslogic 154 for performing basic data access control operations, such as blocking or disallowing, as well as modifying read, write, and other access attempts of the storage device data, such as particular regions of the storage device. Indeed, a storage device can possess functionality for defining and initializing portions of the disk for secure storage (e.g., secure storage logic 158), and can further possess functionality for managing the disk (e.g., disk management logic 164). Relatedly, an example storage device can possess logic for defining and reserving sections of memory as an encryptedsecure vault 180 section. - Further, in some examples, storage device can be configured with
logic 160 for performing a copy on write operation to automatically produce a backup copy of one or more data records in response to an attempt to overwrite the one or more data records. An example storage device can be further configured withlogic 162 to produce other backup copies, for instance, copying a particular write attempt and saving the write attempt to backup memory, in lieu of allowing the write attempt to overwrite the actual targeted data records (e.g., a save attempted write (SAW) operation). Further, storage device can be provided withlogic 166 for locking particular records, for instance, through an LBA lock, etc. Additional features and functionality of a secure-storage-enabled storage device (e.g., 110) can include logic for performing false data reads, logic for blocking certain write or read attempts, logic for returning a false write success, among other examples. - In general, “servers,” “clients,” “client devices,” “computing devices,” “network elements,” “hosts,” “system-type system entities,” “storage devices,” and “systems,” including system devices in
example computing environment 100, can include electronic computing devices operable to receive, transmit, process, store, or manage data and information associated with thecomputing environment 100. As used in this document, the term “computer,” “processor,” “processor device,” or “processing device” is intended to encompass any suitable processing device. For example, elements shown as single devices within thecomputing environment 100 may be implemented using a plurality of computing devices and processors, such as server pools including multiple server computers. Further, any, all, or some of the computing devices may be adapted to execute any operating system, including Linux, UNIX, Microsoft Windows, Apple OS, Apple iOS, Google Android, Windows Server, etc., as well as virtual machines adapted to virtualize execution of a particular operating system, including customized and proprietary operating systems. - Further, servers, client devices, network elements, systems, and computing devices can each include one or more processors, computer-readable memory, and one or more interfaces, among other features and hardware. Servers can include any suitable software component or module, or computing device(s) capable of hosting and/or serving software applications and services, including distributed, enterprise, or cloud-based software applications, data, and services. For instance, in some implementations, security management tools can be implemented on cloud-implemented computing systems configured to remotely host, serve, or otherwise manage data, software services and applications interfacing, coordinating with, dependent on, or used by other services and devices in
system 100. In some instances, a server, system, subsystem, or computing device can be implemented as some combination of devices that can be hosted on a common computing system, server, server pool, or cloud computing environment and share computing resources, including shared memory, processors, and interfaces. - Computing devices can include traditional and mobile computing devices, including personal computers, laptop computers, tablet computers, smartphones, personal digital assistants, feature phones, handheld video game consoles, desktop computers, internet-enabled televisions, and other devices designed to interface with human users and capable of communicating with other devices over one or more networks. Computer-assisted, or “smart,” appliances can include household and industrial devices and machines that include computer processors and are controlled, monitored, assisted, supplemented, or otherwise enhance the functionality of the devices by the computer processor, other hardware, and/or one or more software programs executed by the computer processor. Computer-assisted appliances can include a wide-variety of computer-assisted machines and products including refrigerators, washing machines, automobiles, HVAC systems, industrial machinery, ovens, security systems, and so on.
- Some computing devices can further include at least one graphical display device and user interfaces, supported by computer processors of the system devices, that allow a user to view and interact with graphical user interfaces of applications and other programs provided in
system 100, including user interfaces and graphical representations of programs interacting with applications hosted within the system devices as well as graphical user interfaces associated with application management server services and other applications, etc. Moreover, while system devices may be described in terms of being used by one user, this disclosure contemplates that many users may use one computer or that one user may use multiple computers. - While
FIG. 1 is described as containing or being associated with a plurality of elements, not all elements illustrated withincomputing environment 100 ofFIG. 1 may be utilized in each alternative implementation of the present disclosure. Additionally, one or more of the elements described in connection with the examples ofFIG. 1 may be located external tocomputing environment 100, while in other instances, certain elements may be included within or as a portion of one or more of the other described elements, as well as other elements not described in the illustrated implementation. Further, certain elements illustrated inFIG. 1 may be combined with other components, as well as used for alternative or additional purposes in addition to those purposes described herein. - Turning now to the simplified block diagram of
FIG. 2 , example subsystems of a computing device are illustrated including elements responsible for managing various storage capabilities of the device. In a user mode 205 of the device,traditional applications 210, disk utilities, security software, etc. (215, 220) can be provided. Thekernel mode 225 of the device can includefile system 230,volume manager 235,partition manager 240,disk class driver 245, and storage bus driver 250. Modern malware has been known to exploit each level (e.g., 230, 235, 240, 245, 250) of thekernel mode 225 including the storage bus driver 250 and other elements sitting at the bottom-most layer of the stack. Unfortunately, traditional disk access controls and security tools do not protect at the storage bus driver level. Implementations applying principles of theexample system 100 described above can address several of the shortcomings and issues of traditional disk access control systems. - Turning now to the example of
FIG. 3 , a simplified block diagram is shown of a diskaccess security agent 115 interfacing with various storage devices (e.g., 325, 330, 335) at various levels of the software stack including chipset-based storage devices (e.g., 325), host-based storage devices (e.g., 330), as well as solid state drive (SSD) devices (e.g., 335) using acommon API 120. Diskaccess security agent 115 can be utilized in connection with secure storage functionalities available at secure-storage-enabled storage devices (e.g., 325, 330, 335), including at the storage port (or storage bus) driver level. For instance, host-based secure storage can be provided at the lowest level of the software stack, such as in an RST driver or controller driver. Host-based secure storage can function potentially across multiple hard disks and storage devices. Secure storage can additionally or alternatively be implemented at the chipset level, for instance, at the device communication bus level. In still another example, such secure storage functionality can additionally or alternatively be implemented at the disk level, such as in firmware of a computing device's solid-state drive (SSD), among other examples. In the example ofFIG. 3 , acommon API 120 can be defined allowing for diskaccess security agent 115 to control storage security at any one of the host-based, chipset-based, and/or firmware based levels. Such anAPI 120 can abstract the interface to each of these three technologies and provide a common set of functionality that can be utilized at the direction, for example, of the diskaccess security agent 115 communicating with these storage security technologies over the common API. - A unified secure storage API, or
common API 120, can encompass the functionality of host-, firmware- and chipset-based implementations of a secure storage solution. Such anAPI 120 can additionally be used to obtain a listing of which secure-storage-enabled storage devices are available on a system as well as query each device's secure storage capabilities (e.g., whether the device includes host-, firmware- and/or chipset-based implementations of a secure storage solution). The API can further allow a diskaccess security agent 115, for instance, to create, apply, and manage separate policies for each individual device, such as policies used by higher-level and user mode security tools. - In one example,
native APIs FIG. 3 , each of a chipset-basedsecure storage device 325, host-basedsecure storage device 330, andsecure SSD 335 can have a corresponding native API (305 a, 305 b, 305 c respectively).Common API 120 can act as a translator of commands and instructions received through or by diskaccess security agent 115 into instructions compatible with a respective, corresponding native API (e.g., 305 a-c) of the target secure storage device (e.g., 325, 330, 335). In some implementations, diskaccess security agent 115 can include logic for accessing and communicating through native APIs 305 a-c directly. Alternative implementations of a diskaccess security agent 115 can forego use of acommon API 120, in some examples, among other potential implementations. Hardware and/or software-implemented logic can manage access to particular secure storage devices and native APIs 305 a-c can provide interfaces to such logic. For instance,chipset logic 310 can provide secure storage functionality implemented at the chipset level for one or more storage devices (e.g., 325),storage port driver 325 can be used to provide secure storage functionality implemented at the host level for one or more storage devices (e.g., 330), and SSD firmware 348 (or alternatively middleware 320) can manageSSD 335. Further, respectivesecure storage logic - In some example implementations, a native, or kernel mode, API can be provided in a statically linked library maintained, for instance, by one or more hardware and/or security providers. User mode APIs may be omitted in some instance. The library, in some instances, can be statically linked to a system's lower-class filter driver, among other examples. Further, API function definitions can evolve over time as new secure storage capabilities are developed and native APIs and the common API can be extended to support such additional capabilities.
- Example implementations of a common API can provide multiple, simultaneous device support in that the common, unified API supports management of each storage device available on the system that includes functionality compatible with the API. A disk access security agent can communicate with each storage device individually through the same common API. Additionally, in some implementations, multiple secure storage technologies can be applied simultaneously on a single storage device (e.g., through host-based secure storage support over a firmware based secure storage drive, etc.). In such instances, the disk access security agent may have access to the combined superset of the capabilities present on a given storage device. Some implementations of the disk access security agent can be configured to query and configure combined feature sets in some implementations, rather than defining the combined feature sets in the common API, as in some alternate implementations. Such management can include, for instance, protecting against conflicts between potentially multiple secure vaults present on the same device (e.g., one secure vault for the host-based solution, one for the firmware based solution and one for the chipset-based solution, etc.).
- In some implementations, a common API may use a handle (or other identifier) to identify a target storage device and the respective secure storage technology to which the API call applies. This can allow for the configuration of specific devices and, in the case of callbacks, identification of the source device. Installation and provisioning tasks can additionally be provided, through one or more APIs, including in some examples a user mode library. For instance, the installer module, for example, on a disk access security agent controlling storage devices of a system, can carry out various installation and provisioning tasks, such as those described herein. For example, a list of secure-storage-enabled storage devices can be queried to discover such devices. Further, in some implementations, a capability query can be performed to identify a list of secure storage capabilities for each device (and hardening level) on the system so as to install appropriate point product features. Further, in addition to the capabilities return, for instance, from a native or kernel API query, additional attributes of a storage device can be identified, such as whether the storage device has already been provisioned. Further, an example installer module can be capable of upgrading, for instance, a disk access security agent and/or class filter driver used in the implementation of the disk access security agent if an installation package contains a newer version than what is currently installed, among other examples. Accordingly, packaging disk access security agent with point products and providing disk access security agent upgrade capabilities can provide convenience and save users from the additional step of manually updating the disk access security agent, among other examples. In some implementations, the installer module can be capable of running silently, with no user interface, using input values specified on the command line and hardcoded defaults, among other examples.
- Provisioning can be tightly integrated with installation and relate to the process of allocating reserved space on a storage device disk for a secure vault, among other examples. Additionally, provisioning can include obtaining of encryption/authentication keys to be used in communications, for instance, between the storage device and an agent or other programs. An example installer can initiate creation of a secure vault on every device utilizing secure storage capabilities as well as at each secure storage implementation (or hardening level) being utilized on the device. This can serve to create storage for logs, backup data (e.g., for copy-on-write's and save attempting write's), encryption keys, sensitive user/application data, whitelists, blacklists, data loss prevention (DLP) data, DAT file storage, etc., as well as secure storage for metadata generated and used by the storage device. Optionally, the installer may specify space for application-defined storage.
- Secure vault creation can include preparing the disk (i.e., secure-storage-enabled storage device), either through repartitioning or shrinking the reported disk capacity. Initialization tasks can be performed on the secure vault, such as segmenting it for multiple uses (logging, backups, application data) and potentially installing a file system. Provisioning can further include provisioning of authentication credentials. Provisioning can be possible in an environment without an Internet connection, in some implementations, such as where a provisioning server is available on the local intranet, among other examples.
- Authentication credentials can be provisioned. Credentials can be provisioned differently for various secure storage technologies. For instance, in one implementation, firmware based secure storage can rely on SIGMA protocol or other encryption techniques while host-based secure storage utilizes host-based encryption schemes services. The deprovisioning can also be performed, for instance, by the installer module, including the complete wiping of a designated secure vault storage before returning the disk space to the system. In some implementations, if a new secure storage compatible storage device is added after the initial installation and provisioning, a mechanism can be provided for provisioning the new storage device, for instance, through a user mode service process that communicates with disk access security agent, among other example implementations. The disk access security agent can then discover the newly provisioned storage device during the disk access security agent's normal initialization process.
- A secure vault can be regarded as a multipurpose storage area that can be subdivided, for instance with various sections, such as sections for log storage, backup storage (for the “copy on write” and “save attempted write” actions), application defined storage (e.g., as managed by the agent), storage device metadata, among other implementations. In some examples, storage device metadata can be hidden from visibility of the disk access security agent. The size of the secure vault can be specified at provisioning time. If the particular secure storage implementation utilizes additional reserved space for storage device metadata then that can be handled implicitly by the secure vault provisioning API. Further, communication to and from a secure vault can be encrypted so as to block visibility of the data to external actors. Similarly, data at rest in the secure vault can be either encrypted or otherwise hidden to external actors outside of an authenticated secure channel. In some implementations, encryption keys utilized to encrypt the secure vault can be managed and changed periodically, or in response to determining that the secure vault and/or its encryption has somehow been compromised. This can, in some implementations, result in the decryption and re-encryption of the secure vault data. The disk access security agent can possess functionality for specifying the size limits of secure vault subdivisions (log, backup and application-defined storage) as well as other configurations at creation time. In some instances, size limit specified for a secure vault may be static while in other implementations dynamic resizing of the secure vault can be facilitated, for instance, to allow for expansion of the secure vault without deprovisioning/reprovisioning and potential loss of secure vault data (including backups and log entries) and policies. Further, in some implementations, the reserved space of the secure vault can be represented to users, such as by reducing the reported capacity of the drive so that the secure vault is completely invisible, displaying the secure vault space as a separate partition, or displaying the secure vault as a file within the file system, among other examples.
- Additional steps can be performed by a disk access security agent in connection with initialization of storage devices employing secure storage capabilities. For instance, as part of the disk stack, the disk access security agent can be monitoring the initialization of storage devices without the use of the common API. A capabilities query can additionally return information such as a version number corresponding to the secure storage implementation of a detected storage device. The current secure storage device configuration can be queried, for instance, to examine the persistent settings at start up time. Additionally, the disk access security agent can query a storage device's power cycle counter, for instance, to determine if the drive has been used, for instance, while the disk access security agent was unavailable or disconnected. In some instances, the disk access security agent can perform an integrity check to ensure the system is clean and that any persistent policy settings are still valid. Further, in some examples, the disk access security agent can be used to detect whether there has been any unexpected communication with a particular storage device since the disk access security agent was last running, including policy changes affecting the common API, direct read operations, direct write operations, secure vault accesses, among other examples. Further, two-way, mutual authentication can be supported between the disk access security agent and a supported secure storage device.
- Turning now to the example of
FIG. 4 , a simplified block diagram is shown illustrating one particular example implementation of a system including secure storage capabilities. As shown in the example ofFIG. 4 , a diskaccess security agent 115 can interface with any one of a variety of implementations of secure-storage-enabled storage devices. In one example, secure storage features 410 of diskaccess security agent 115 can be supported or at least partially implemented through aclass filter driver 405 corresponding to the diskaccess security agent 115.Class filter driver 405 can be statically linked withcommon API 120 to pass commands from diskaccess security agent 115 to host-basedsecure storage logic 345, SSD-basedsecure storage logic 350, etc. Synchronous operation can be supported, for example, operations can complete before the API returns and the return status can indicate success or failure of the operation. Callbacks to asynchronous event notifications can be provided and disk locations, in some implementations, can be expressed in logical block addressing (LBA), with file to LBA mapping completed, for instance, utilizing Windows (or other) API calls, among other example implementations. - A variety of services can be provided in connection with secure storage enabled storage devices and disk access security agents. For instance, deep and trusted disk monitoring can be carried out, as well as data access protection. In some implementations, self-protection and early detection functions can be supported, as well as disk-level remediation, provision of secure storage space, among other features. For instance, a set of features can be enabled for hardened system protection, detection, and remediation. Storage block and file lockdown can be realized, for instance, by failing write attempts to locked disk blocks (e.g., MBR, recover OS protection, etc.). In another example, storage block and file level monitoring can be facilitated with write attempts to “watched” disk blocks and files reported (synchronously) to a cooperating disk access security agent.
- Advanced disk monitoring functionality can also be enabled based on a secure storage device and disk access security agent implementation. For example, disk regions can be defined as “protected” and subject to monitoring and access control according to one or more corresponding policies. Monitoring can include the monitoring of various type of data access attempts, include read attempt, write attempts, TRIM (SSD) attempts, etc. Further, monitoring at the lowest level of the software stack through a secure storage enabled storage device can allow intelligence to be gathered and called-back to the disk access security agent allowing for additional functionality and features, such as attribution, blacklisting and whitelisting (based on attribution results and historical trends of various actors), runtime decision-making (e.g., regarding access to data on the storage device), etc. Further, a disk access security agent can issue commands to the storage device, for instance, over a common API triggering the performance of various operations (e.g., in accordance with the enforcement of one or more relevant policies identified by the agent) such as copy on write operations, save attempt read operations, false data read operation, logging (e.g., to supplement intelligence capable of being analyzed, at least in part, using the agent), among other examples.
- Systems and storage devices utilizing principles described above can exhibit still additional functionality. For instance, a secure storage device and disk access security agent implementation can provide “always on” protection. For example, when the disk access security agent is active, or interfacing with other security management services, dynamic and online security policies, real-time decision-making, and real-time notification services can be facilitated through the disk access security agent based upon information identified and conveyed by the secure storage device monitoring read/write operations at the storage port driver level, or lowest layer of the software stack. When the disk access security agent (or storage device) is off-line, protection can still be provided, for instance, through off-line policies allowing protection early in the boot cycle of the device via prevention, detection, and remediation operations capable of being performed by the storage device directly at the boot loader level (e.g., to protect against bootkit attacks, etc.). Off-line protection can even extend, in some examples, when a storage device is moved to another machine (e.g., in firmware-based secure storage implementations), among other examples.
- A storage device can enjoy a true view of its disk contents. As noted above, direct read and direct write operations can be completed by the storage device, for instance, at the direction of a disk access security agent interfacing with the storage device via a defined API. Direct read and direct write operations can be useful, for example, because they cannot be blocked or altered or otherwise interfered with by other programs, including malware, in the disk stack. Such operations can be useful, for instance, in connection with such tasks as remediation, integrity checking (e.g., hash calculations), high/low comparisons of file data, among other examples.
- Turning to the examples of
FIGS. 5A-5B , simplified representations are illustrated of example operations that can be performed using a secure storage enabled storage device, for instance, in connection with or at the direction of an example disk access security agent. For instance, in the example ofFIG. 5A , a particular data record or range of data records (e.g., 505) can be identified corresponding to data or files of interest. Such protected or monitored records can be determined or specified in connection with operation and services of one or more security tools protecting such data and interfacing, for example, with an example disk access security agent. For instance, in one example, suspicious behavior may be detected (e.g., through attribution analysis) in connection with the detected range of data records. An attempt to learn more about thedata records 505 can be initiated, for example, to determine whether a file within therange 505 is malware, among other examples. - In the illustrated example of
FIG. 5A , a system read, such as a read of thedata records 505 by a sensor or application operating at a higher level of the software, such as through the file system, may be presented with a spoofed or false representation of the contents of data records 505. The integrity of this response can be checked, for instance, utilizing direct read functionality provided to the storage device. The direct read can read thedata records 505, bypassing the disk stack and influence of the file providing the false representation ofdata records 505 in order to obtain the true and actual contents of the range of data records 505. In this particular example, it is identified that the response to the system-level read was falsified based on a comparison of that response with the results of a direct read. The direct read may be triggered through the disk access security agent and other security management tools (interfacing with the disk access security agent) and analyzing the nature of the file (e.g., antivirus or anti-malware tools, etc.). Through the direct read, this abnormality can be detected and be considered along with other factors in determining whether the range ofdata records 505 houses malware or other malicious content, among other examples. - Turning to the example of
FIG. 5B , direct write operability of the storage device can be triggered by a disk access security agent and employed to remediate detected problems within an identified range of data records (e.g., 505) on the disk. For instance, one or more security management tools, such as the tools detecting thatdata records 505 correspond with malware on the device, may request (through a disk access security agent) that thedata records 505 be remediated. In some implementations, initial remediation attempts may be pursued utilizing traditional remediation technology. In some instance, if such remediation attempts are unsuccessful (or considered less desirable), direct write functionality can be employed to directly access the data record utilizing the storage device (e.g., via the direction of the disk access security agent interfacing with the storage device via the common API) and directly overwrite (e.g., using copy on write backup data) or delete thetarget data records 505 and remediate the issue. Further, in some implementations, a lock can be requested and applied to the identifiedregion 505 of the disk to protect against that region being re-infected, among other examples. - As noted above, a security device, at the direction of a disk access security agent, can perform lockdowns of ranges of data records, including LBA range lockdowns. For efficiency, in some implementations, a subset of ranges can be designated as monitored, important, or protected. Varying policies, monitoring techniques, and protection techniques can be further designated for the various subsets of ranges. For example, separate policies can be definable for each type of access (e.g., Write, Read and TRIM). File-to-LBA mapping can be performed by the disk access security agent. Further, each LBA range can allow metadata to be specified for the purpose of mapping event and log data back to the file system entities that are being accessed. The metadata can be defined and provided by the disk access security agent and can accompany all logging, eventing (callbacks), and backup data associated with access to the respective LBA range. The disk access security agent can associate this metadata with an LBA-to-filename mapping and possibly some additional context data, among other examples.
- In some implementations, protection ranges may not be permitted to overlap. In other implementations, protection ranges are not so restricted. For instance, when multiple secure storage technology implementations are in use on the same device, the disk access security agent can be allowed to configure different policies for the same or overlapping LBA range for each implementation. For instance, one implementation may possess more desirable or effective remediation functionality, allowing for the more effective implementation to have precedents in cases where protection ranges theoretically overlap and/or interfere.
- For each LBA range that is configured for monitoring, secure storage devices can be presented (e.g., by the disk access security agent) with corresponding actions to take when access to that range is attempted. In some implementations, multiple actions, including a hierarchy or series of actions, can be defined in response to particular detected events, such as identified access attempts of the protected range. For instance, if one of the proscribed actions fails (such as Copy-On-Write), this may not alter the other defined actions (such as block/allow). Failures can be logged, in some implementations, but then the other actions should proceed as normal. Further, policies can define actions that apply for the same LPA range to “online mode”, when the disk access security agent has a registered callback, or “off-line mode” when the disk access security agent is not available. Indeed, if a timeout is experienced in connection with an action, such as while waiting for asynchronous callback to complete, then the secure storage device can failover to the off-line action, in some implementations. Callbacks, such as synchronous callbacks, can be used between the storage device and the disk access security agent to coordinate the performance of actions at the storage device. For example, a callback routine in the disk access security agent can be invoked to process an event and the callback can return, in response, the actions that should be performed by the secure storage device.
- A variety of actions can be returned in connection with a synchronous callback from a disk access security agent. Indeed, a combination of actions can be returned. Such actions can include, for example, for “read” events: an allow or block of the read; performance of a false data read and return of a modified view of the data; log details of the read event, among other examples. For “write” events, any combination of the following may be returned: the write can be allowed, blocked, or blocked with a returned ‘fake’ success; copy-on-write operation; save-attempted-write operation; logging of the write event, among other examples. For “trim” events, any combination of the following may be returned: allow or block of the trim; copy-on-write; logging of the trim event, among other examples. The original read/write event may be held in a PENDING state while the synchronous callback is processed.
- Further, policies can provide for actions configured for “offline” mode when the disk access security agent is not available. For “read” events, any combination of the following can be performed: allow or block of the read; logging details of the read event, among other examples. For “write” events, any combination of the following can be provided: the write can be allowed, blocked, or blocked with a returned ‘fake’ success; copy-on-write operation; save-attempted-write operation; logging of the write event, among other examples. For “trim” events, any combination of the following may be returned: allow or block of the trim; copy-on-write; logging of the trim event, among other examples.
- A disk access security agent can register a status callback for receiving notifications (errors or other status) from a secure storage enabled storage device. Such notifications can identify important conditions such as that backup storage or secure vault is full, among other examples. Further, in some examples, the following information can be provided to the callback routines: LBA range being accessed, LBA range metadata that was specified during configuration, type of access being requested (read/write/trim), contents being written (if applicable), SRB, IRP or similar pointer used for the disk access (to aid the agent in matching the low-level I/O to a higher level request, and ultimately the process that initiated the I/O). Further, the callback can, in some instances, modify the data being written/read.
- Logging can include the logging, as well as the maintaining and accessing, of information such as an indication of the LBA range being accessed, the LBA range metadata that was specified during configuration, the type of access being requested (read/write/trim), an indication as to whether the access was allowed or blocked, the offset and length of data being read/written, a timestamp (or a mechanism that allows the agent to infer a timestamp from the storage drive's timing counters), among other potential examples. The log data can be stored in a designated section of the secure vault. Logging can include, for instance, violation reports (when particular monitored/protected LBA ranges are accessed) and status/error notices, for instance, from the storage device. Such error notices can include, for example, notices indicating that the secure vault's backup space is exhausted or that the secure storage device timed-out while waiting for the disk access security agent's callback to process an event, etc. Further, in some implementations, the log can be treated as a circular buffer. When a size limit is reached, the oldest entries of the log can be purged with new data continuously appended thereto.
- Turning to the examples of
FIGS. 6A-6C , simplified block diagrams are shown illustrating an example copy-on-write (COW) operation. As noted above, portions of a disk can be designated as protected. Accordingly, in the example ofFIG. 6A , aportion 605 of an example disk is represented as protected. For example, an initialization step can be performed to identify important or sensitive files and ranges within the disk storage, such as record ranges corresponding to important operating system files, the boot sector such as a master boot record (MBR), a master file table, and security application files (e.g., for self-protection of the agent and other security service, etc.), among other examples. Corresponding policies can be applied to various types of protected disk data record ranges. In some implementations, write attempts of records (e.g., 610) within protected disc ranges (e.g., 605) can be subject to policies that trigger an automated copy-on-write operation in response to the read attempt according to one or more applied policies. For example, modern malware may attempt to take control of an overwrite of important operating system and boot sector files. Typically, such malware may lock the overwritten or infected region of the disk, and otherwise resist removal or remediation by traditional techniques and tools. - As shown in the current example, a write attempt of protected
data records 610 can trigger a backup copy of thedata record 610 to be made and stored, for instance, in backup memory. In some instances, the backup copy can reside in a secure vault region of the disk. The write attempt can be allowed to proceed and rewrite thedata record 610, as shown inFIG. 68 . Turning toFIG. 6C , it may be later determined that the write attempt todata record 610 should not have occurred, for instance, based on a determination, for example, by one or more security management applications or security tools interfacing with a disk access security agent, that the write attempt corresponded to some suspicious, unstable, or malicious code on the device. Accordingly, the backup copy created through the copy-on-write operation can be utilized, through a direct write to the data range 610, to restore the contents of the written-todata range 610. - Copy-on-write operations can be useful in restoring original data during remediation of malware and other undesirable code. Copy-on-write data can be maintained in a backup region of the disk, such as in the secure vault. If there is not enough space in the backup area to accommodate new copy-on-write data, other backup data can be overwritten or, in some instances, the copy-on-write operation can be skipped, among other examples. Further, in instances where a disk write attempt extends beyond the monitored LBA range, the copy-on-write operation can backup only the portion of the data corresponding to the LBA range being monitored. For example, if LBA range 100-110 is being monitored but a write attempt is made to range 95-115, then the COW backup should only reflect the data from LBA range 100-110. Further, in some implementations, backup entries can be named in a meaningful way so that the disk access security agent can communicate which entries it wants to act on. Indeed, a disk access security agent can be configured to iterate through the list of backups, retrieve the metadata for each, and read the full data for an entry, among other examples.
-
FIGS. 7A-7C illustrate an example save-attempted-write (SAW) operation and false data read involving an example secure storage enabled storage device. For example, inFIG. 7A , a write attempt is identified on adata record 705 included in a protected range of data records 710. In some implementations, the write attempt can trigger, according to one or more policies, a save-attempted-write operation. A save-attempted-write operation can be taken, for instance, when a suspected malware payload is being written to the disk. The data that was attempted to be written can be backed up, for instance, so that more extensive (asynchronous) evaluation of the data can be performed, for example, through further monitoring at the storage device. Save-attempted-write data can be stored in a designated section of the secure vault that, in some examples, includes other backup data, for instance, from the copy-on-write operations. - In the example of
FIG. 7A , the save-attempted-write operation can be ordered, for instance, by the disk access security agent, based on intelligence received at the disk access security agent (e.g., from another security tool interfacing with the disk access security agent) that a detected write attempt originates from or relates to a suspected malicious, unstable, or suspicious program, among other examples. Turning toFIG. 7B , in some instances, the program responsible for the original write attempt may attempt to detect whether its actions are being monitored or blocked, for instance, by sending a read back request to verify that its write attempt was allowed and successful. It can be determined, that the detected read back request originates from this program, with the assistance of the disk access security agent and potentially other security management applications. Further, based on this determination, a false data read action can be triggered (e.g., according to one or more policies) that responds to the read back request using the save-attempted-write backup data including the contents of the original write attempt. In some instances, a whitelist or blacklist can be consulted to determine whether to provide the read back request or a full view of the data or to trigger a false data read action. A false data read action can buy the system additional time to assess the nature of the originating program making the write attempt. In some instances, despite blocking the original attempt, it can be determined that the source of the write attempt is trustworthy and that the attempt was legitimate. Accordingly, as shown in the example ofFIG. 7C , the agent can request that the storage device implement the original write attempt (ofFIG. 7A ) by copying corresponding data from the save-attempted-write backup and writing the data to the target data record 705 (e.g., utilizing a direct write action). - As with COW actions, if there is not enough space in the secure vault's backup area for a new entry then the SAW operation can be skipped and the existing secure vault data can remain unchanged. In other implementations, the SAW action can move forward overwriting older backup data. A failure to perform a save-attempted-write action can be reported to the log. Further, in some implementations, when an attempted disk write extends beyond the monitored LBA range, the save-attempted-write may backup only the portion of the data corresponding to the LBA range being monitored.
- In some implementations, the operating system can provide a numerically addressable abstraction of the storage device to the low level drivers like the storage bus driver, disk class filter driver and any filter drivers on the disk class driver. The address range can range from zero up to the size of the disk in terms of its sectors. Each sector size can be dependent on the formatting scheme of the storage device. Each sector can be addressed by its LBA or logical block address. A configuring application (e.g., utilizing a disk access security agent) can send policy data for protection of sectors of the storage device. The policy data in its simplest form can include the type of I/O operation (read/write/both), the starting address of the sector (LBA), and the number of sectors to be protected. Protection can imply that the I/O operation as chosen in the policy is denied by the disk filter driver, if the I/O is in the region of disk defined by the sectors/LBAs in the policy.
- In one example, an I/O operation by any application can be defined by one or more of the type of I/O (e.g., READ/WRITE), the disk region it is aimed at (in terms of the sector on the disk), and the size. The disk filter, therefore, can keep the policy data in its system memory and check it for every I/O operation taking place on the disk. Since the disk filter's check (or look up) operation is in the two path of every application running on the system and the storage device, and the number of policies could be many and be scattered across all the LBAs on the disk, the disk filter's check operation can significantly degrade the performance of the application, the disk access security agent, and the system as whole.
- To assist more efficiently looking up policies applicable to the particular disk region (or range of data records on the disk) an improved look up mechanism can be provided to allow a more targeted search of relevant policies. For instance, is illustrated in the simplified examples of
FIGS. 8A-8B , storage media can be considered as a single linearly growing and numerically addressable object of a fixed number of sectors. For instance,FIG. 8A illustrates a representation of a disk of N sectors. Shaded regions can represent, for example, ranges on the disk defined by starting sector and its length. The disk filter driver can store many such ranges along with one or more policies associated with each range governing actions for I/O (or read/write) attempts on the range. - In some instances, the number of ranges stored (and the associated policies with each range) can be very high and it would be suboptimal to store them in data structures with a high or linear order of search. In one example implementation, a tree structure can be used such as a binary search tree, such as an AVL tree. Further, each policy applicable to one or more data records in a range can be, in some implementations, stored as a node record of a single global search tree for the entire disk. In other, more optimized implementations, multiple binary search trees can be provided for a single disk. Each defined range can be assigned an associated tree such that each tree has a much smaller depth (and thereby improving the overall look up time). Indeed, instead of utilizing one global tree per disk and having to traverse the tree for every I/O, the disk can be construed as a collection of sections such as a collection of many equal sized smaller disks (plus a possible unequal last disk) referred to as extents.
- In one example implementation, a single AVL (or other binary) tree can be provided and assigned to each extent defined for the disk. Accordingly, each tree only stores policy information for the disk ranges corresponding to its respective extant. In some instances, a particular range may span across multiple extent boundaries, in which case a single range, in some instances, can be broken into multiple ranges and subdivided across the multiple extents such that each portion of the single range is contained within a single extent boundary. Further, each extent specific tree can include nodes identifying policies applicable to data record ranges within the corresponding extent. This can provide for much more efficient searches of the respective trees. For instance, in response to a detected read/write action involving a particular data record or range of data records, one or more corresponding extents can be identified that contain the particular data record or range of records. Further, corresponding search trees for the extents of the particular data records can be identified and searched to swiftly determine whether policies or protection designations have been defined that apply to the particular data records.
- Further, in some implementations, a bit mask can be maintained that provides a shorthand mechanism for determining whether any policies have been defined for records within a given extent. For example, the bit mask can include bits storing the state of “protection ranges” in a given extent. For instance, if a corresponding extent has any number (greater than zero) of protected ranges, its bit can be marked “TRUE”. However, if a given extent has no protected ranges or applied policies, its corresponding bit can be marked “FALSE”. In the example of
FIG. 8B , for instance,extent 805 can include a protectedrange 815 and its corresponding bit in the bit mask can be set to “1”. Similarly,extents FIG. 88 . - Through the use of the example bit mask, or other indicator, such as a flag, the identification of a particular extent for an identified range of records can first result in a lookup of the bit mask or other indicator to determine whether any protected ranges or policies exist within the extent. If it is determined that no such ranges or policies exist by virtue of the bit mask or other indicator, a search of the corresponding extent search tree can be skipped (and the I/O attempt can proceed seamlessly without extra intervention by the storage device and/or disk access security agent, in some examples). Where the bit mask indicates that one or more protected ranges or policies pertain to ranges within a given extent, the corresponding extent search tree can be identified and searched to determine whether policies or protections are applied to the particular range of records, in some cases triggering the secure storage functionality of the storage device and/or disk access security agent, among other examples.
-
FIGS. 9A-9E includeflowcharts 900 a-e illustrating example techniques utilizing a secure storage platform based, at least in part, on principles described above. For instance, in the example ofFIG. 9A , a disk access security agent can interface with both one or more security tools and one or more secure-storage-enabled storage devices. A request can be received 902 from a security tool relating to data records of one of the storage devices. The request can, for example, request a verification or inspection of data on the storage device (e.g., using a direct read), identify a security event such as an attempt to write, read, or otherwise access the storage device, and request a particular security operation or set of security operations to be performed on the storage device utilizing the secure storage functionality of the storage device, in accordance with one or more security policies, among other examples. The disk access security agent can interface 904 with the storage device using an API. In some implementations, the API can be a common API for use in interfacing with multiple different implementations of secure-storage-enabled storage devices. The API can be used to trigger operations offered through the secure storage functionality of the storage device in connection with a response to the request received 902 from the security tool. For instance, the disk access security agent can cause 906, for instance, through a call to the API, one or more security operations to be performed at the storage device using the secure storage functionality. Such security operations can be make use of secure storage operations such as a direct read, direct write, false data read, false write success, COW, SAW, logging, record locks, allowing and blocking read and write attempts, among other examples. - In the example of
FIG. 98 , a locked or otherwise protected data record can be identified 908 in a secure-storage-enabled storage device. A direct read can be caused to be performed 910 to identify the actual values at the storage device directly from the storage device. The identified values can be communicated 912 to a security tool and instructions to modify the values of the record can be received 914 from the security tool in response. A direct write of the data records can be caused to be performed 916 to rewrite the actual values of the data record with values different from those returned in the results of the direct read. - In the example of
FIG. 9C , an attempted to write to one or more data records of a secure-storage-enabled storage device is identified 918 (e.g., from a communication from a security tool monitoring at least portions of the records of the storage device). It can be identified 920 that the particular data record is protected or that one or more security policies apply to the particular data record. A security operation can be performed 922, such as a copy-on-write operation to create a copy of the contents of the data record prior to allowing the write attempt to write new data to the particular data record. The copied data can be backed-up in a COW data record and used to restore the values of the particular data record, for instance, through a direct write of the data back to the particular data record. - In the example of
FIG. 9D , an attempted write of a particular data record of a secure-storage-enabled storage device can be identified 924 and trigger a SAW operation, for instance, based on a request or communication from a security tool identifying that the write attempt may be of a malicious or untrusted nature. For instance, the data that is attempted to be written in the attempted write can be saved 926 by writing the data to backup storage, such as a SAW data record. The SAW data record can then be used 928, for instance, to analyze the nature and source of the write attempt and determine whether the write attempt is or is not associated with malware, an error, or other undesirable condition. - In the example of
FIG. 9E , an attempted I/O operation can be identified 930 involving a particular data record of a storage device. A particular portion (e.g., an extent) of the storage device can be identified 932 that corresponds to the particular data record, such as a portion of the storage device in which the particular data record is located. A lookup tree structure can be identified 934 in a set of lookup tree structures that corresponds to the identified portion of the storage device. The lookup tree can then be used 936 to determine whether policies, rules, or functionality apply to the particular data record. In some instances, determining that one or more policies or rules apply to the particular data record can trigger one or more secure storage operations to be performed at the direction of a disk access security agent, such as a COW operation, SAW operation, false data read operation, false write success operation, blocking of the I/O operation, and so on. -
FIGS. 10-12 are block diagrams of exemplary computer architectures that may be used in accordance with embodiments disclosed herein. Other computer architecture designs known in the art for processors, mobile devices, and computing systems may also be used. Generally, suitable computer architectures for embodiments disclosed herein can include, but are not limited to, configurations illustrated inFIGS. 10-12 . -
FIG. 10 is an example illustration of a processor according to an embodiment.Processor 1000 is an example of a type of hardware device that can be used in connection with the implementations above. -
Processor 1000 may be any type of processor, such as a microprocessor, an embedded processor, a digital signal processor (DSP), a network processor, a multi-core processor, a single core processor, or other device to execute code. Although only oneprocessor 1000 is illustrated inFIG. 10 , a processing element may alternatively include more than one ofprocessor 1000 illustrated inFIG. 10 .Processor 1000 may be a single-threaded core or, for at least one embodiment, theprocessor 1000 may be multi-threaded in that it may include more than one hardware thread context (or “logical processor”) per core. -
FIG. 10 also illustrates amemory 1002 coupled toprocessor 1000 in accordance with an embodiment.Memory 1002 may be any of a wide variety of memories (including various layers of memory hierarchy) as are known or otherwise available to those of skill in the art. Such memory elements can include, but are not limited to, random access memory (RAM), read only memory (ROM), logic blocks of a field programmable gate array (FPGA), erasable programmable read only memory (EPROM), and electrically erasable programmable ROM (EEPROM). -
Processor 1000 can execute any type of instructions associated with algorithms, processes, or operations detailed herein. Generally,processor 1000 can transform an element or an article (e.g., data) from one state or thing to another state or thing. -
Code 1004, which may be one or more instructions to be executed byprocessor 1000, may be stored inmemory 1002, or may be stored in software, hardware, firmware, or any suitable combination thereof, or in any other internal or external component, device, element, or object where appropriate and based on particular needs. In one example,processor 1000 can follow a program sequence of instructions indicated bycode 1004. Each instruction enters a front-end logic 1006 and is processed by one or more decoders 1008. The decoder may generate, as its output, a micro operation such as a fixed width micro operation in a predefined format, or may generate other instructions, microinstructions, or control signals that reflect the original code instruction. Front-end logic 1006 also includes register renaming logic 1010 and scheduling logic 1012, which generally allocate resources and queue the operation corresponding to the instruction for execution. -
Processor 1000 can also includeexecution logic 1014 having a set ofexecution units 1016 a, 1016 b, 1016 n, etc. Some embodiments may include a number of execution units dedicated to specific functions or sets of functions. Other embodiments may include only one execution unit or one execution unit that can perform a particular function.Execution logic 1014 performs the operations specified by code instructions. - After completion of execution of the operations specified by the code instructions, back-
end logic 1018 can retire the instructions ofcode 1004. In one embodiment,processor 1000 allows out of order execution but requires in order retirement of instructions.Retirement logic 1020 may take a variety of known forms (e.g., re-order buffers or the like). In this manner,processor 1000 is transformed during execution ofcode 1004, at least in terms of the output generated by the decoder, hardware registers and tables utilized by register renaming logic 1010, and any registers (not shown) modified byexecution logic 1014. - Although not shown in
FIG. 10 , a processing element may include other elements on a chip withprocessor 1000. For example, a processing element may include memory control logic along withprocessor 1000. The processing element may include I/O control logic and/or may include I/O control logic integrated with memory control logic. The processing element may also include one or more caches. In some embodiments, non-volatile memory (such as flash memory or fuses) may also be included on the chip withprocessor 1000. - Referring now to
FIG. 11 , a block diagram is illustrated of an examplemobile device 1100.Mobile device 1100 is an example of a possible computing system (e.g., a host or endpoint device) of the examples and implementations described herein. In an embodiment,mobile device 1100 operates as a transmitter and a receiver of wireless communications signals. Specifically, in one example,mobile device 1100 may be capable of both transmitting and receiving cellular network voice and data mobile services. Mobile services include such functionality as full Internet access, downloadable and streaming video content, as well as voice telephone communications. -
Mobile device 1100 may correspond to a conventional wireless or cellular portable telephone, such as a handset that is capable of receiving “3G”, or “third generation” cellular services. In another example,mobile device 1100 may be capable of transmitting and receiving “4G” mobile services as well, or any other mobile service. - Examples of devices that can correspond to
mobile device 1100 include cellular telephone handsets and smartphones, such as those capable of Internet access, email, and instant messaging communications, and portable video receiving and display devices, along with the capability of supporting telephone services. It is contemplated that those skilled in the art having reference to this specification will readily comprehend the nature of modern smartphones and telephone handset devices and systems suitable for implementation of the different aspects of this disclosure as described herein. As such, the architecture ofmobile device 1100 illustrated inFIG. 11 is presented at a relatively high level. Nevertheless, it is contemplated that modifications and alternatives to this architecture may be made and will be apparent to the reader, such modifications and alternatives contemplated to be within the scope of this description. - In an aspect of this disclosure,
mobile device 1100 includes atransceiver 1102, which is connected to and in communication with an antenna.Transceiver 1102 may be a radio frequency transceiver. Also, wireless signals may be transmitted and received viatransceiver 1102.Transceiver 1102 may be constructed, for example, to include analog and digital radio frequency (RF) ‘front end’ functionality, circuitry for converting RF signals to a baseband frequency, via an intermediate frequency (IF) if desired, analog and digital filtering, and other conventional circuitry useful for carrying out wireless communications over modern cellular frequencies, for example, those suited for 3G or 4G communications.Transceiver 1102 is connected to aprocessor 1104, which may perform the bulk of the digital signal processing of signals to be communicated and signals received, at the baseband frequency.Processor 1104 can provide a graphics interface to adisplay element 1108, for the display of text, graphics, and video to a user, as well as aninput element 1110 for accepting inputs from users, such as a touchpad, keypad, roller mouse, and other examples.Processor 1104 may include an embodiment such as shown and described with reference toprocessor 1000 ofFIG. 10 . - In an aspect of this disclosure,
processor 1104 may be a processor that can execute any type of instructions to achieve the functionality and operations as detailed herein.Processor 1104 may also be coupled to amemory element 1106 for storing information and data used in operations performed using theprocessor 1104. Additional details of anexample processor 1104 andmemory element 1106 are subsequently described herein. In an example embodiment,mobile device 1100 may be designed with a system-on-a-chip (SoC) architecture, which integrates many or all components of the mobile device into a single chip, in at least some embodiments. -
FIG. 12 illustrates a computing system 1200 that is arranged in a point-to-point (PtP) configuration according to an embodiment. In particular,FIG. 12 shows a system where processors, memory, and input/output devices are interconnected by a number of point-to-point interfaces. Generally, one or more of the computing systems described herein may be configured in the same or similar manner as computing system 1200. -
Processors memory elements memory controller logic processors Memory elements 1232 and/or 1234 may store various data to be used byprocessors -
Processors Processors point interface circuits Processors chipset 1290 via individual point-to-point interfaces point interface circuits Chipset 1290 may also exchange data with a high-performance graphics circuit 1238 via a high-performance graphics interface 1239, using aninterface circuit 1292, which could be a PtP interface circuit. In alternative embodiments, any or all of the PtP links illustrated inFIG. 12 could be implemented as a multi-drop bus rather than a PtP link. -
Chipset 1290 may be in communication with a bus 1220 via aninterface circuit 1296. Bus 1220 may have one or more devices that communicate over it, such as a bus bridge 1218 and I/O devices 1216. Via a bus 1210, bus bridge 1218 may be in communication with other devices such as a keyboard/mouse 1212 (or other input devices such as a touch screen, trackball, etc.), communication devices 1226 (such as modems, network interface devices, or other types of communication devices that may communicate through a computer network 1260), audio I/O devices 1214, and/or adata storage device 1228.Data storage device 1228 may storecode 1230, which may be executed byprocessors 1270 and/or 1280. In alternative embodiments, any portions of the bus architectures could be implemented with one or more PtP links. - The computer system depicted in
FIG. 12 is a schematic illustration of an embodiment of a computing system that may be utilized to implement various embodiments discussed herein. It will be appreciated that various components of the system depicted inFIG. 12 may be combined in a system-on-a-chip (SoC) architecture or in any other suitable configuration capable of achieving the functionality and features of examples and implementations provided herein. - The following examples pertain to embodiments in accordance with this Specification. One or more embodiments may provide an apparatus, a system, a machine readable storage, a machine readable medium, and a method to receive a request from a security tool relating to an event involving data records in a storage device, use an application programming interface (API) to interface with secure storage functionality of the storage device enabling a set of secure storage operations, and cause a security operation to be performed at the storage device involving the data records based at least in part on the request.
- In at least one example, the API can facilitate a set of secure storage functionality common to each of a host-based secure storage capability, a chipset-based secure storage capability, and the firmware-based secure storage capability.
- In at least one example, the set of secure storage operations can include a direct read operation.
- In at least one example, the security operation can include a direct read of a particular one of the data records. Content of the particular data obtained through the direct read can be communicated to the security tool, and causing the security operation to be performed can include causing the particular data record to be rewritten through a direct write operation.
- In at least one example, the set of secure storage operations can include a direct write operation.
- In at least one example, the set of secure storage operations can include a copy-on-write operation.
- In at least one example, the security operation can include a copy-on-write operation and causing the security operation to be performed can include causing an attempted write operation of a particular one of the data records to be identified and data of the one or more data records to be copied to a copy-on-write backup prior to allowing the attempted write operation.
- In at least one example, causing the security operation to be performed can include causing the particular data record, following the attempted write operation, to be remediated by replacing data of the written-to particular data record with data of the copy-on-write backup.
- In at least one example, the data of the written-to particular data record can be replaced with the data of the copy-on-write backup through a direct write operation.
- In at least one example, the set of secure storage operations can include a save-attempted-write operation.
- In at least one example, the security operation can include a save-attempted-write operation, the request can be used to identify an attempted write operation of a particular one of the data records, and causing the security operation to be performed can include causing the attempted write operation to be saved by disallowing the attempted write operation on the particular record and causing the write operation to be performed instead on a save-attempted-write (SAW) record.
- In at least one example, causing the security operation to be performed can include causing a response to be generated to a read-back request of the particular data record with a false data read incorporating contents of the written-to SAW record.
- In at least one example, causing the security operation to be performed can include causing the attempted write operation to be allowed after saving the attempted write operation, and using contents of the SAW record to allow the attempted write operation.
- In at least one example, the set of secure storage operations can include a false data read operation.
- In at least one example, the set of secure storage operations can include a data range lockdown operation.
- In at least one example, the set of secure storage operations can include each of a direct read operation, a direct write operation, an allow write operation, and a block write operation. The set can further include a false data read operation and a false write success operation.
- In at least one example, feedback data can be received from the secure storage device via the API, the feedback data describing results of the security operation. The feedback data can be included in a callback, a log generated by the secure storage platform, or another form.
- While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
- Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
- Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results.
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/614,836 US10360398B2 (en) | 2012-10-19 | 2017-06-06 | Secure disk access control |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1213/KOL/2012 | 2012-10-19 | ||
IN1213KO2012 | 2012-10-19 | ||
PCT/US2013/048754 WO2014062252A1 (en) | 2012-10-19 | 2013-06-28 | Secure disk access control |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/048754 A-371-Of-International WO2014062252A1 (en) | 2012-10-19 | 2013-06-28 | Secure disk access control |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/614,836 Continuation US10360398B2 (en) | 2012-10-19 | 2017-06-06 | Secure disk access control |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140310800A1 true US20140310800A1 (en) | 2014-10-16 |
US9672374B2 US9672374B2 (en) | 2017-06-06 |
Family
ID=50488628
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/126,880 Active US9672374B2 (en) | 2012-10-19 | 2013-06-28 | Secure disk access control |
US15/614,836 Active US10360398B2 (en) | 2012-10-19 | 2017-06-06 | Secure disk access control |
US16/507,635 Active US11270015B2 (en) | 2012-10-19 | 2019-07-10 | Secure disk access control |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/614,836 Active US10360398B2 (en) | 2012-10-19 | 2017-06-06 | Secure disk access control |
US16/507,635 Active US11270015B2 (en) | 2012-10-19 | 2019-07-10 | Secure disk access control |
Country Status (5)
Country | Link |
---|---|
US (3) | US9672374B2 (en) |
EP (1) | EP2909783B1 (en) |
JP (1) | JP6073482B2 (en) |
CN (2) | CN104662552B (en) |
WO (1) | WO2014062252A1 (en) |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150378771A1 (en) * | 2014-06-28 | 2015-12-31 | Vmware, Inc. | Using a delta query to seed live migration |
US9317686B1 (en) * | 2013-07-16 | 2016-04-19 | Trend Micro Inc. | File backup to combat ransomware |
US9356969B2 (en) * | 2014-09-23 | 2016-05-31 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US9552217B2 (en) | 2014-06-28 | 2017-01-24 | Vmware, Inc. | Using active/active asynchronous replicated storage for live migration |
US20170048277A1 (en) * | 2010-01-20 | 2017-02-16 | American Express Travel Related Services Company, Inc. | Selectable encryption methods |
WO2017065904A1 (en) * | 2015-10-13 | 2017-04-20 | Mcafee, Inc. | Remote provisioning and authenticated writes to secure storage devices |
US9672120B2 (en) | 2014-06-28 | 2017-06-06 | Vmware, Inc. | Maintaining consistency using reverse replication during live migration |
WO2017125935A1 (en) * | 2016-01-24 | 2017-07-27 | Minerva Labs Ltd. | Ransomware attack remediation |
US9760443B2 (en) | 2014-06-28 | 2017-09-12 | Vmware, Inc. | Using a recovery snapshot during live migration |
US9766930B2 (en) | 2014-06-28 | 2017-09-19 | Vmware, Inc. | Using active/passive asynchronous replicated storage for live migration |
WO2017168016A1 (en) * | 2016-04-01 | 2017-10-05 | Telefonica Digital España, S.L.U. | Method and system for protecting a computer file against possible malware encryption |
US20170351870A1 (en) * | 2016-06-03 | 2017-12-07 | Honeywell International Inc. | Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system |
US20180082075A1 (en) * | 2015-06-02 | 2018-03-22 | Viirii, Llc | Operating system independent, secure data storage system |
US20180174156A1 (en) * | 2013-06-18 | 2018-06-21 | Stmicroelectronics (Rousset) Sas | Mechanism for verifying the authenticity of a product |
WO2018166020A1 (en) * | 2017-03-17 | 2018-09-20 | 广州众诺电子技术有限公司 | Chip encryption method |
US20180293377A1 (en) * | 2015-10-13 | 2018-10-11 | Nec Corporation | Suspicious behavior detection system, information-processing device, method, and program |
US10282543B2 (en) * | 2017-05-03 | 2019-05-07 | International Business Machines Corporation | Determining whether to destage write data in cache to storage based on whether the write data has malicious data |
US10360266B2 (en) * | 2016-03-15 | 2019-07-23 | Omron Corporation | Data-flow control device and data-flow control method |
US10445497B2 (en) | 2017-05-03 | 2019-10-15 | International Business Machines Corporation | Offloading processing of writes to determine malicious data from a first storage system to a second storage system |
EP3588340A1 (en) * | 2018-06-26 | 2020-01-01 | InnoTech21 GmbH | Computer-implemented method for operating a data storage device |
US10671545B2 (en) | 2014-06-28 | 2020-06-02 | Vmware, Inc. | Asynchronous encryption and decryption of virtual machine memory for live migration |
US10715515B2 (en) | 2010-06-22 | 2020-07-14 | American Express Travel Related Services Company, Inc. | Generating code for a multimedia item |
US10725661B2 (en) * | 2015-06-29 | 2020-07-28 | International Business Machines Corporation | Selective write control |
US10735473B2 (en) | 2009-07-17 | 2020-08-04 | American Express Travel Related Services Company, Inc. | Security related data for a risk variable |
US10798111B2 (en) * | 2016-09-14 | 2020-10-06 | International Business Machines Corporation | Detecting intrusion attempts in data transmission sessions |
US10997571B2 (en) | 2009-12-17 | 2021-05-04 | American Express Travel Related Services Company, Inc. | Protection methods for financial transactions |
US11188641B2 (en) | 2017-04-07 | 2021-11-30 | International Business Machines Corporation | Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to determine whether the process is a suspicious process |
US11237749B2 (en) * | 2019-06-06 | 2022-02-01 | EMC IP Holding Company LLC | System and method for backup data discrimination |
US11425170B2 (en) | 2018-10-11 | 2022-08-23 | Honeywell International Inc. | System and method for deploying and configuring cyber-security protection solution using portable storage device |
US11475159B2 (en) | 2019-10-30 | 2022-10-18 | EMC IP Holding Company LLC | System and method for efficient user-level based deletions of backup data |
US11507473B2 (en) | 2019-10-30 | 2022-11-22 | EMC IP Holding Company LLC | System and method for efficient backup generation |
US11586506B2 (en) | 2019-10-30 | 2023-02-21 | EMC IP Holding Company LLC | System and method for indexing image backups |
US11593497B2 (en) | 2019-10-30 | 2023-02-28 | EMC IP Holding Company LLC | System and method for managing sensitive data |
US11687595B2 (en) | 2019-10-30 | 2023-06-27 | EMC IP Holding Company LLC | System and method for searching backups |
US11953996B1 (en) | 2023-01-20 | 2024-04-09 | Dell Products L.P. | Method and system for selectively preserving data generated during application access |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104662552B (en) | 2012-10-19 | 2017-12-12 | 迈克菲股份有限公司 | The disk access control of safety |
WO2018036626A1 (en) | 2016-08-25 | 2018-03-01 | Huawei Technologies Co., Ltd. | Apparatus and method for software self test |
US10776197B1 (en) | 2017-06-27 | 2020-09-15 | EMC IP Holding Company LLC | Detect and triage data integrity issue for virtual machine |
KR102043538B1 (en) * | 2018-01-18 | 2019-11-11 | 주식회사 알티스트 | Computing system for monitoring process by applying partitioning |
TW202010766A (en) | 2018-06-19 | 2020-03-16 | 德商巴斯夫歐洲公司 | Transparent hard thermoplastic polyurethanes |
US11151273B2 (en) | 2018-10-08 | 2021-10-19 | Microsoft Technology Licensing, Llc | Controlling installation of unauthorized drivers on a computer system |
US11080416B2 (en) | 2018-10-08 | 2021-08-03 | Microsoft Technology Licensing, Llc | Protecting selected disks on a computer system |
CN111382783A (en) * | 2020-02-28 | 2020-07-07 | 广州大学 | Malicious software identification method and device and storage medium |
EP4156004A4 (en) * | 2021-02-05 | 2024-06-26 | Namusoft Co., Ltd | Data protection system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7814554B1 (en) * | 2003-11-06 | 2010-10-12 | Gary Dean Ragner | Dynamic associative storage security for long-term memory storage devices |
US20110219425A1 (en) * | 2010-03-08 | 2011-09-08 | Ying Xiong | Access control using roles and multi-dimensional constraints |
US20130304705A1 (en) * | 2012-05-11 | 2013-11-14 | Twin Peaks Software, Inc. | Mirror file system |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6304946B1 (en) * | 1999-07-01 | 2001-10-16 | Emc Corporation | System and method for optimizing cache write backs to disks |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US6971018B1 (en) * | 2000-04-28 | 2005-11-29 | Microsoft Corporation | File protection service for a computer system |
US6901519B1 (en) | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
US6610605B2 (en) * | 2001-06-28 | 2003-08-26 | Intel Corporation | Method and apparatus for fabricating encapsulated micro-channels in a substrate |
US7434068B2 (en) * | 2001-10-19 | 2008-10-07 | Intel Corporation | Content protection in non-volatile storage devices |
EP1795991A1 (en) * | 2002-07-30 | 2007-06-13 | Fujitsu Limited | Method and apparatus for reproducing information using a security module |
US7409587B2 (en) * | 2004-08-24 | 2008-08-05 | Symantec Operating Corporation | Recovering from storage transaction failures using checkpoints |
US7640594B2 (en) * | 2004-01-21 | 2009-12-29 | Sap Ag | Secure storage in a file system |
JP2005352535A (en) * | 2004-06-08 | 2005-12-22 | Ark Joho Systems:Kk | Method of protecting data |
US7246209B2 (en) | 2004-11-30 | 2007-07-17 | Kabushiki Kaisha Toshiba | System for secure erasing of files |
US7962917B2 (en) * | 2005-03-10 | 2011-06-14 | Microsoft Corporation | System data interfaces, related architectures, print system data interfaces and related print system architectures |
JP2007026081A (en) * | 2005-07-15 | 2007-02-01 | Canon Inc | Program |
US20070061597A1 (en) * | 2005-09-14 | 2007-03-15 | Micky Holtzman | Secure yet flexible system architecture for secure devices with flash mass storage memory |
US7565685B2 (en) * | 2005-11-12 | 2009-07-21 | Intel Corporation | Operating system independent data management |
US20080063206A1 (en) * | 2006-09-07 | 2008-03-13 | Karp James M | Method for altering the access characteristics of encrypted data |
JP2009104250A (en) * | 2007-10-19 | 2009-05-14 | Mitsubishi Electric Corp | Execution system, program, and execution method |
US8220053B1 (en) * | 2008-06-26 | 2012-07-10 | Trend Micro, Inc. | Shadow copy-based malware scanning |
US8176085B2 (en) * | 2008-09-30 | 2012-05-08 | Microsoft Corporation | Modular forest automata |
US20100146267A1 (en) * | 2008-12-10 | 2010-06-10 | David Konetski | Systems and methods for providing secure platform services |
KR20100078081A (en) | 2008-12-30 | 2010-07-08 | (주) 세인트 시큐리티 | System and method for detecting unknown malicious codes by analyzing kernel based system events |
JPWO2010140222A1 (en) * | 2009-06-02 | 2012-11-15 | 富士通株式会社 | Information processing system, management apparatus, and information processing method |
WO2011077684A1 (en) * | 2009-12-22 | 2011-06-30 | パナソニック株式会社 | Optical disc device, optical disc control method, and integrated circuit |
US8925101B2 (en) * | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8863283B2 (en) | 2011-03-31 | 2014-10-14 | Mcafee, Inc. | System and method for securing access to system calls |
CN103620613B (en) * | 2011-03-28 | 2018-06-12 | 迈克菲股份有限公司 | For the system and method for the anti-malware safety based on virtual machine monitor |
EP2556881A1 (en) | 2011-08-11 | 2013-02-13 | Nederlandse Organisatie voor toegepast -natuurwetenschappelijk onderzoek TNO | Combining algae cultivation and CO2 capture |
CN102339256B (en) * | 2011-09-15 | 2013-10-16 | 东北大学 | Complex event detection method on basis of IMF (instance matching frequency) internal and external memory replacement policy |
CN104662552B (en) | 2012-10-19 | 2017-12-12 | 迈克菲股份有限公司 | The disk access control of safety |
-
2013
- 2013-06-28 CN CN201380048900.7A patent/CN104662552B/en active Active
- 2013-06-28 EP EP13847351.7A patent/EP2909783B1/en active Active
- 2013-06-28 JP JP2015531918A patent/JP6073482B2/en active Active
- 2013-06-28 CN CN201711085138.6A patent/CN107977573B/en active Active
- 2013-06-28 US US14/126,880 patent/US9672374B2/en active Active
- 2013-06-28 WO PCT/US2013/048754 patent/WO2014062252A1/en active Application Filing
-
2017
- 2017-06-06 US US15/614,836 patent/US10360398B2/en active Active
-
2019
- 2019-07-10 US US16/507,635 patent/US11270015B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7814554B1 (en) * | 2003-11-06 | 2010-10-12 | Gary Dean Ragner | Dynamic associative storage security for long-term memory storage devices |
US20110219425A1 (en) * | 2010-03-08 | 2011-09-08 | Ying Xiong | Access control using roles and multi-dimensional constraints |
US20130304705A1 (en) * | 2012-05-11 | 2013-11-14 | Twin Peaks Software, Inc. | Mirror file system |
Cited By (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10735473B2 (en) | 2009-07-17 | 2020-08-04 | American Express Travel Related Services Company, Inc. | Security related data for a risk variable |
US10997571B2 (en) | 2009-12-17 | 2021-05-04 | American Express Travel Related Services Company, Inc. | Protection methods for financial transactions |
US10432668B2 (en) * | 2010-01-20 | 2019-10-01 | American Express Travel Related Services Company, Inc. | Selectable encryption methods |
US20170048277A1 (en) * | 2010-01-20 | 2017-02-16 | American Express Travel Related Services Company, Inc. | Selectable encryption methods |
US10931717B2 (en) | 2010-01-20 | 2021-02-23 | American Express Travel Related Services Company, Inc. | Selectable encryption methods |
US10715515B2 (en) | 2010-06-22 | 2020-07-14 | American Express Travel Related Services Company, Inc. | Generating code for a multimedia item |
US20180174156A1 (en) * | 2013-06-18 | 2018-06-21 | Stmicroelectronics (Rousset) Sas | Mechanism for verifying the authenticity of a product |
US10540663B2 (en) * | 2013-06-18 | 2020-01-21 | Stmicroelectronics (Rousset) Sas | Mechanism for verifying the authenticity of a product |
US9317686B1 (en) * | 2013-07-16 | 2016-04-19 | Trend Micro Inc. | File backup to combat ransomware |
US20150378771A1 (en) * | 2014-06-28 | 2015-12-31 | Vmware, Inc. | Using a delta query to seed live migration |
US10394668B2 (en) | 2014-06-28 | 2019-08-27 | Vmware, Inc. | Maintaining consistency using reverse replication during live migration |
US9760443B2 (en) | 2014-06-28 | 2017-09-12 | Vmware, Inc. | Using a recovery snapshot during live migration |
US9766930B2 (en) | 2014-06-28 | 2017-09-19 | Vmware, Inc. | Using active/passive asynchronous replicated storage for live migration |
US10579409B2 (en) | 2014-06-28 | 2020-03-03 | Vmware, Inc. | Live migration of virtual machines with memory state sharing |
US9626212B2 (en) | 2014-06-28 | 2017-04-18 | Vmware, Inc. | Live migration of virtual machines with memory state sharing |
US9898320B2 (en) * | 2014-06-28 | 2018-02-20 | Vmware, Inc. | Using a delta query to seed live migration |
US10671545B2 (en) | 2014-06-28 | 2020-06-02 | Vmware, Inc. | Asynchronous encryption and decryption of virtual machine memory for live migration |
US9588796B2 (en) | 2014-06-28 | 2017-03-07 | Vmware, Inc. | Live migration with pre-opened shared disks |
US9552217B2 (en) | 2014-06-28 | 2017-01-24 | Vmware, Inc. | Using active/active asynchronous replicated storage for live migration |
US10394656B2 (en) | 2014-06-28 | 2019-08-27 | Vmware, Inc. | Using a recovery snapshot during live migration |
US9672120B2 (en) | 2014-06-28 | 2017-06-06 | Vmware, Inc. | Maintaining consistency using reverse replication during live migration |
US20160364566A1 (en) * | 2014-09-23 | 2016-12-15 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US10055580B2 (en) * | 2014-09-23 | 2018-08-21 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US9356969B2 (en) * | 2014-09-23 | 2016-05-31 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US10726142B2 (en) * | 2015-06-02 | 2020-07-28 | Viirii, Llc | Operating system independent, secure data storage system |
US20180082075A1 (en) * | 2015-06-02 | 2018-03-22 | Viirii, Llc | Operating system independent, secure data storage system |
US10725661B2 (en) * | 2015-06-29 | 2020-07-28 | International Business Machines Corporation | Selective write control |
US20180293377A1 (en) * | 2015-10-13 | 2018-10-11 | Nec Corporation | Suspicious behavior detection system, information-processing device, method, and program |
US10229281B2 (en) | 2015-10-13 | 2019-03-12 | Mcafee, Llc | Remote provisioning and authenticated writes to secure storage devices |
WO2017065904A1 (en) * | 2015-10-13 | 2017-04-20 | Mcafee, Inc. | Remote provisioning and authenticated writes to secure storage devices |
US10482278B2 (en) | 2015-10-13 | 2019-11-19 | Mcafee, Llc | Remote provisioning and authenticated writes to secure storage devices |
US10789361B2 (en) | 2016-01-24 | 2020-09-29 | Minerva Labs Ltd. | Ransomware attack remediation |
WO2017125935A1 (en) * | 2016-01-24 | 2017-07-27 | Minerva Labs Ltd. | Ransomware attack remediation |
US20180211038A1 (en) * | 2016-01-24 | 2018-07-26 | Minerva Labs Ltd. | Ransomware attack remediation |
US10360266B2 (en) * | 2016-03-15 | 2019-07-23 | Omron Corporation | Data-flow control device and data-flow control method |
WO2017168016A1 (en) * | 2016-04-01 | 2017-10-05 | Telefonica Digital España, S.L.U. | Method and system for protecting a computer file against possible malware encryption |
US20170351870A1 (en) * | 2016-06-03 | 2017-12-07 | Honeywell International Inc. | Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system |
US10402577B2 (en) * | 2016-06-03 | 2019-09-03 | Honeywell International Inc. | Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system |
US10798111B2 (en) * | 2016-09-14 | 2020-10-06 | International Business Machines Corporation | Detecting intrusion attempts in data transmission sessions |
WO2018166020A1 (en) * | 2017-03-17 | 2018-09-20 | 广州众诺电子技术有限公司 | Chip encryption method |
US11651070B2 (en) | 2017-04-07 | 2023-05-16 | International Business Machines Corporation | Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to determine whether the process is a suspicious process |
US11188641B2 (en) | 2017-04-07 | 2021-11-30 | International Business Machines Corporation | Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to determine whether the process is a suspicious process |
US10282543B2 (en) * | 2017-05-03 | 2019-05-07 | International Business Machines Corporation | Determining whether to destage write data in cache to storage based on whether the write data has malicious data |
US10445497B2 (en) | 2017-05-03 | 2019-10-15 | International Business Machines Corporation | Offloading processing of writes to determine malicious data from a first storage system to a second storage system |
US11120128B2 (en) | 2017-05-03 | 2021-09-14 | International Business Machines Corporation | Offloading processing of writes to determine malicious data from a first storage system to a second storage system |
US11144639B2 (en) | 2017-05-03 | 2021-10-12 | International Business Machines Corporation | Determining whether to destage write data in cache to storage based on whether the write data has malicious data |
EP3588340A1 (en) * | 2018-06-26 | 2020-01-01 | InnoTech21 GmbH | Computer-implemented method for operating a data storage device |
US11425170B2 (en) | 2018-10-11 | 2022-08-23 | Honeywell International Inc. | System and method for deploying and configuring cyber-security protection solution using portable storage device |
US11237749B2 (en) * | 2019-06-06 | 2022-02-01 | EMC IP Holding Company LLC | System and method for backup data discrimination |
US11507473B2 (en) | 2019-10-30 | 2022-11-22 | EMC IP Holding Company LLC | System and method for efficient backup generation |
US11586506B2 (en) | 2019-10-30 | 2023-02-21 | EMC IP Holding Company LLC | System and method for indexing image backups |
US11593497B2 (en) | 2019-10-30 | 2023-02-28 | EMC IP Holding Company LLC | System and method for managing sensitive data |
US11475159B2 (en) | 2019-10-30 | 2022-10-18 | EMC IP Holding Company LLC | System and method for efficient user-level based deletions of backup data |
US11687595B2 (en) | 2019-10-30 | 2023-06-27 | EMC IP Holding Company LLC | System and method for searching backups |
US11953996B1 (en) | 2023-01-20 | 2024-04-09 | Dell Products L.P. | Method and system for selectively preserving data generated during application access |
Also Published As
Publication number | Publication date |
---|---|
EP2909783B1 (en) | 2020-02-12 |
CN107977573B (en) | 2021-10-01 |
WO2014062252A1 (en) | 2014-04-24 |
US11270015B2 (en) | 2022-03-08 |
JP2015531948A (en) | 2015-11-05 |
US9672374B2 (en) | 2017-06-06 |
EP2909783A1 (en) | 2015-08-26 |
CN107977573A (en) | 2018-05-01 |
US20190332794A1 (en) | 2019-10-31 |
JP6073482B2 (en) | 2017-02-01 |
US20180089457A1 (en) | 2018-03-29 |
CN104662552B (en) | 2017-12-12 |
EP2909783A4 (en) | 2016-09-28 |
CN104662552A (en) | 2015-05-27 |
US10360398B2 (en) | 2019-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11270015B2 (en) | Secure disk access control | |
CN110998582B (en) | Secure storage device and computer security method | |
EP3123311B1 (en) | Malicious code protection for computer systems based on process modification | |
EP3761208B1 (en) | Trust zone-based operating system and method | |
US11522904B2 (en) | Self-healing architecture for resilient computing services | |
US8195980B2 (en) | Virtual machine snapshotting and damage containment | |
US8490189B2 (en) | Using chipset-based protected firmware for host software tamper detection and protection | |
US8495750B2 (en) | Filesystem management and security system | |
US8037290B1 (en) | Preboot security data update | |
CN109074450B (en) | Threat defense techniques | |
EP3265949B1 (en) | Operating system management | |
US9396329B2 (en) | Methods and apparatus for a safe and secure software update solution against attacks from malicious or unauthorized programs to update protected secondary storage | |
US10783041B2 (en) | Backup and recovery of data files using hard links | |
US9275238B2 (en) | Method and apparatus for data security reading | |
US11461460B2 (en) | Software container application encryption | |
JP6243479B2 (en) | Inoculators and antibodies for computer security | |
US10642979B1 (en) | System and method for application tamper discovery | |
US20080127352A1 (en) | System and method for protecting a registry of a computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MCAFEE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUGHES, MICHAEL;TEDDY, JOHN;KABRA, ATUL;SIGNING DATES FROM 20130722 TO 20130729;REEL/FRAME:032261/0421 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918 Effective date: 20161220 |
|
CC | Certificate of correction | ||
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786 Effective date: 20170929 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:054206/0593 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:055854/0047 Effective date: 20170929 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:054238/0001 Effective date: 20201026 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:059354/0213 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:059354/0335 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:060792/0307 Effective date: 20220301 |